GOVERNMENT > Law Enforcement


« Back to News

2024-03-28

Beware Of Online Fraud When Booking Your Summer Holiday

April is a key time of year for the travel industry as consumers start to make summer holiday plans. This also provides fraudsters an opportunity.

2024-03-08

$15m Bounty To Identify LockBit Bosses

A huge reward is being offered for information leading to the identification or location of any of the leaders of the LockBit ransomware gang.

2024-04-15

British Police Are Innovating With Data Analytics

Insights That Lead To Actionable Decisions: Data analytics is playing an increasingly prominent role in police forces around the world.

2024-03-12

Wireless Security In Smart Homes Is Vulnerable

Home security devices that connect directly to a domestic WiFi network or a smart home hub can be jammed, rendering remote alarms useless.

2024-02-23

A European Cybercrime Breakthrough Is Only Half The Battle

The First Rule Of Cybercrime Is That No One Goes To Prison: Cybercrime is global in nature but criminal laws are intensely local. By Emily Taylor

2024-02-21

Lockbit's Website Taken Down By Law Enforcement

Update: Lockbit provided ransomware-as-a-service to a global network of hackers, supplying the tools needed to carry out attacks.

2024-02-16

British Police, AI & The Fight Against Cyber Crime 

The fraud and cybercrime landscape is going to be profoundly transformed by AI. A top British Police officer answers some key questions.

2024-01-08

Abduction & Extortion Goes Online

Cyber Kidnapping: Criminals coerce a victim to stage their own kidnapping and film it, providing blackmail material against their own families.

2023-12-18

Online Fraud Is Driven By Human Trafficking

Billion Dollar Criminal Exploits: Victims are lured through fake job ads and forced to commit online financial crimes on an industrial scale.

2023-11-15

The Dark Web Encompasses Both Criminal & Legal Activities

The term Dark Web sounds ominous and it is that part of the Internet comprising websites you can't access through the usual web browsers.

2023-10-09

Police Access To Passport Database 'risks public trust'

Plans to integrate the UK Police National Database and Passport Office data will enable police to find a facial match with the 'click of one button'.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Infrascale

Infrascale

Infrascale specialise in providing cloud backup and disaster recovery services.

BSA - The Software Alliance

BSA - The Software Alliance

BSA is the leading advocate for the global software industry before governments and in the international marketplace.

Magal Security Systems (Magal S3)

Magal Security Systems (Magal S3)

Magal Security Systems is a leading international provider of integrated solutions and products for physical and cyber security, safety and site management.

MailXaminer

MailXaminer

MailXaminer is an advance and powerful email investigation platform that scans digital data, performs analysis, reports on findings and preserves them in a court validated format.

7 Elements

7 Elements

7 Elements is an independent IT security testing company providing expertise in technical information assurance through security testing, incident response and consultancy.

Barbara IoT

Barbara IoT

Barbara is an industrial device platform specifically designed for IoT deployments.

S4x Events

S4x Events

S4x are the most advanced and largest ICS cyber security events in the world.

RFA

RFA

RFA is a unique IT, financial cloud and managed cyber-security provider to the financial services and alternative investment sectors.

WiSecure Technologies

WiSecure Technologies

WiSecure Technologies aims to develop cryptographic products meeting requirements in the new economic era.

Key Cyber Solutions

Key Cyber Solutions

Key Cyber is an IT consulting firm that specializes in agile software development services, program management and infrastructure services, cyber security and cloud and managed services.

Rhino Security Labs

Rhino Security Labs

Rhino Security Labs is a top penetration testing and security assessment firm, with a focus on cloud pentesting, network pentesting, web application pentesting, and phishing.

Quad9 Foundation

Quad9 Foundation

Quad9 is a free security solution that uses DNS to protect your system against the most common cyber threats. It improves your system's performance, plus, it preserves and protects your privacy.

Exceed Cybersecurity & I.T. Services

Exceed Cybersecurity & I.T. Services

Exceed Cybersecurity & I.T. Services is a premier Managed Internet Technology (I.T.) company with a focus in cybersecurity risk management and CMMC compliance management.

Recon InfoSec

Recon InfoSec

The Recon InfoSec team includes analysts, architects, engineers, intrusion specialists, penetration testers, and operations experts.

Abertay cyberQuarter

Abertay cyberQuarter

The Abertay cyberQuarter is a cybersecurity research and development centre housed within Abertay University.

Eficens Systems

Eficens Systems

Eficens Systems is a global IT services and consulting company. We specialize in empowering businesses to harness the potential of Information Technology as a strategic asset.