BUSINESS > Services > Law


« Back to News

2025-07-25

Clorox Sues Cognizant For £300m Alleging Negligence

Breach Enabled By Password Reset Failure: Helpdesk staff allegedly reset an employee’s password for a hacker without verifying their identity.

2025-07-07

An Organisation’s Responsibility Following A Data Leak

Empathy & Action: Data breaches are serious events that affect real people, not just abstract statistics. By Wouter Klinkhamer

2025-06-05

Japan Enacts Landmark Cyber Defence Legislation

The law empowers Japan’s police and Self-Defense Forces to conduct surveillance & offensive cyber operations to protect critical infrastructure.

2025-05-23

New Law Bans Intimate Deepfake Images

The Take It Down Act: New US legislation aims to criminalise the distribution of AI-generated deepfakes and intimate images without consent.

2025-05-22

Major Cyber Attack On British Legal Aid Agency

British Legal Aid Data Hacked: Personal and criminal records have been compromised as sensitive data of thousands of applicants is exposed.

2025-05-21

Pegasus Spyware Maker Fined

For the first time, a developer of spyware has been held responsible for exploiting vulnerabilities in smartphone platforms.

2025-05-16

Examining The NIS2 Directive From Outside The EU

The EU Network & Information Systems Directive 2: Its strengths, weaknesses, and a possible alternative path for the UK. By Notis Iliopoulos

2025-05-05

New British Child Protection Regulations

Platforms which include pornography, or content which encourages self-harm, suicide or eating disorders must prevent children using that content.

2025-05-01

Legal Steps To Take When Facing A Cybersecurity Breach In Your Business

Quickly understanding the legal steps to take after a breach can help business owners minimize their liability and protect their customers.

2025-04-22

Google's Online Advertising Technology Ruled Illegal

Monopoly Power: Google faces the possibility of US courts ordering it to sell assets or change its business practices to avoid anti-trust violations.

2025-02-10

Apple Ordered To Give Access To Users' Encrypted Data

Investigatory Powers: British law enforcement have demanded access to encrypted data stored by Apple users in its global cloud service.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

SABSACourses

SABSACourses

SABSA is a development process used for solving complex problems such as IT Operations, Risk Management, Compliance & Audit functions.

Kore Telematics

Kore Telematics

Kore is a leading managed service provider for IoT and M2M applications.

National Cyber Security Directorate (DNSC) - Romania

National Cyber Security Directorate (DNSC) - Romania

DNSC (formerly CERT-RO) is the Romanian national cyber security and incident response team.

United Security Providers

United Security Providers

United Security Providers is a leading specialist in information security, protecting IT infrastructures and applications for companies with high demands on security.

LEADS

LEADS

LEADS is considered as a leading ICT Solution Provider and an IT partner of choice in Bangladesh.

iSolutions

iSolutions

iSolutions is an official reseller and engineering company of leading products and solutions for cybersecurity and information protection, optimization, visualization and control of applications

Ukrainian Academy of Cyber Security (UACS)

Ukrainian Academy of Cyber Security (UACS)

UACS is a professional non-profit public organization established to promote the development of an extensive network and ecosystem of education and training in the field of cyber security.

Xopero Software

Xopero Software

Xopero Software develops a comprehensive range of professional tools for protecting and restoring critical business data.

Palitronica

Palitronica

Palitronica build cutting-edge hardware and breakthrough software that revolutionizes how we defend critical infrastructure and key resources.

Invicti Security

Invicti Security

Invicti Security is an AppSec leader transforming the way web applications are secured.

Oxeye

Oxeye

Oxeye fills the gap between cloud and code to show exploitable vulnerabilities, and their path from API to code. More visibility. Less noise. More time to build.

Obsidian Security

Obsidian Security

Protect your business-critical applications by mitigating threats and reducing risk with Obsidian, the first truly comprehensive security solution for SaaS.

Systal Technology Solutions

Systal Technology Solutions

Systal is a global managed network and security service and transformation specialist. We help enterprise-level businesses maximise the security and business value of their complex IT infrastructure.

Alchemy Security Consulting

Alchemy Security Consulting

Alchemy Security Consulting specialise in offensive and defensive cyber security. We find the weak link in your security so you can patch it up fast and avoid being hacked.

System Two Security

System Two Security

System Two Security automates detection engineering and threat hunting.

Mode

Mode

Mode is an out-of-band communication and crisis collaboration platform. One platform to manage your cyber crisis response. Stay connected when it's needed most.