GOVERNMENT > Law Enforcement


« Back to News

2015-04-17

Baltimore Police Use ‘Stingray’ Cellphone Surveillance

US Police deploy controversial 'Stingray' cellphone surveillance technology.

2015-04-16

INTERPOL Targets Cybercrime in Asia

Cybercrime is a game changer for law enforcement in Asia.

2015-04-17

Cybercrime More Profitable Than Drug Trading

Total Global Impact of Cybercrime is US$3 Trillion, making it more profitable than the global trade in marijuana, cocaine & heroin combined.

2015-04-16

Interpol Cyber Research Identifies Malware Threat to Currencies

Interpol has identified a threat to the blockchain in virtual transactions, which could result in their being embedded with malware.

2015-04-07

UK's Merseyside Police Plan Biometric Bail System

Liverpool Police are replacing a paper-based bail system with a biometric process.

2015-03-30

Bitcoin 'exit scam': Deep-Webbers disappear with $12m

The administrators of a top deep-web marketplace have disappeared

2015-03-29

Crime has gone High-Tech and the Law Hasn’t

Everthing is connected, everyone is vulnerable, and what we can do about it....

2015-03-24

FBI Plans to Expand its Hacking Powers

A US judicial advisory panel quietly approved a rule change that will broaden the FBI’s hacking authority despite fears of a “monumental” constitutional concern.

2015-03-24

UK Police Should Retry Gun Technology Sensors

ShotSpotter promises to save police having to hunt door-to-door in the vague vicinity of gunfire.

2015-03-08

How do we police the digital age?

Opinion by Giles Herdale - Essex Police National Lead on Digital Intelligence & Investigation Strategy.

2015-03-08

The Dark Web: anarchy, law, freedom and anonymity

The Deep Web is of intense interest to people who want to avoid government spies and law enforcement.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cryptsoft

Cryptsoft

Cryptsoft provides key management and security software development toolkits based around open standards such as OASIS KMIP and PKCS#11.

Learn How To Become

Learn How To Become

At LearnHowToBecome.org, our mission is to help any job-seeker understand what it takes to build and develop a career. We cover many specialist areas including cybersecurity.

S2S Group

S2S Group

S2S Group specialise in the destruction and management of IT assets at the end of the lifecycle.

BIND 4.0

BIND 4.0

Bind 4.0 is an acceleration program geared toward tech startups with solutions applied to Advanced Manufacturing, Smart Energy, Health Tech or Food Tech fields.

BotRx

BotRx

BotRx is the only AI-enabled, automated fraud protection technology that allows fast & easy deployment - continually keeping invisible bad bots and agents at bay, so you can rest easy.

HSB

HSB

HSB offers insurance for equipment breakdown, cyber risk, data breach, identity recovery & employment practices liability.

Space ISAC

Space ISAC

Space ISAC is the only all-threats security information source for the public and private space sector.

Concentric

Concentric

Concentric Data Risk Monitoring and Protection. Deep Learning to discover, monitor and remediate risks to sensitive data on-premises and in the cloud.

Duality Technologies

Duality Technologies

Duality Technologies combine Advanced Cryptography with Data Science to deliver High-Performance Privacy-Protecting Computing to Regulated Industries.

Etonwood

Etonwood

Etonwood specialises in infrastructure and vendor technology recruitment in areas including cloud platforms, cyber security and service management.

Foundries.io

Foundries.io

Foundries.io have built a secure, open source platform for the world's connected devices, and a cloud service to configure this to any hardware and any cloud.

Pratum

Pratum

Pratum is an information security services firm that helps clients solve challenges based on risk, not fear.

Rocky Mountain Cybersecurity

Rocky Mountain Cybersecurity

Rocky Mountain Cybersecurity's mission is to provide value by dramatically improving the cybersecurity posture of our clients and business partners.

Amazon Web Services (AWS)

Amazon Web Services (AWS)

Amazon Web Services is the world’s most comprehensive and broadly adopted cloud platform, offering fully featured services from data centers globally.

Safe Decision

Safe Decision

Safe Decision is an information technology company offering Cyber Security, Network, and Infrastructure Services and Solutions.

RIoT Secure

RIoT Secure

RIoT Secure AB is a technology enabler within the IoT industry - created with a vision to ensure security technology exists in the foundations of software development for IoT solutions.