BUSINESS > Services > Law


« Back to News

2019-12-10

Finland Has A Cyber Security Standard For IoT

As consumers become more reliant on smart devices and calls for IoT regulation spread internationally, Finland has set the standard.

2019-12-06

Free Speech And The Detention Of Julian Assange

Is Julian Assange a journalist and is journalism a crime? Yes and No, say those who oppose his extradition to the US on spying changes.

2019-12-04

The Kids Cyber Protection Code

Children start facing privacy risks as soon as they enter the digital environment, long before their media literacy prepares them to make decisions.

2019-12-02

On Trend: Business Data Protection Laws

Eighty countries worldwide have now adopted strict data protection laws to prohibit misuse of private information. Business must react.

2019-11-26

GDPR Data Regulations & Commercial Fines

GDPR allows EU citizens to see what data is held on them by an organisation and how it is being used. But not all infringements lead to fines.

2019-11-25

Regulatory Plans For Artificial Intelligence & Algorithms

Two pieces of legislation are under consideration by the US Congress, one regulating the use of Algorithms and the other the development of AI.

2019-11-15

Google Challenged For Collecting American Health Data

Google and a US healthcare company have been secretly working together on a project to store and analyse millions of patient medical records.

2019-11-04

Russia Will Try Leaving The Global Internet

Cyber Sovereignty or Virtual Iron Curtain? Russia will test its internal RuNet network to see if the country can function outside the global Internet.

2019-11-01

GDPR Lessons Learned

Uncertainty and contradictions have defined the first year of General Data Protection Regulation (GDPR) enforcement. By Simon Fogg

2019-10-22

Cybersecurity And The EU's Regime For 5G Networks

The powerful new features of 5G networking will bring numerous security challenges. A lot will depend on regulatory compliance. By Joao Paro

2019-10-07

A Cyber Compliance Economy

As the IoT expands, companies are growing more concerned with the question of corporate liability in case of cyber attacks. By Joao Paro.

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

CNCERT/CC

CNCERT/CC

CNCERT is the national Computer Network Emergency Response Technical Team / Coordination Center of China.

ClickDatos

ClickDatos

ClickDatos specializes in consulting, auditing, data protection training, accredited by ISO/IEC 27001 certification.

4iQ

4iQ

4iQ fuses surface, social, deep and dark web sources to research and assess risks to people, infrastructure, intellectual property and reputation.

TechGuard Security

TechGuard Security

TechGuard Security was founded to address national cyber defense initiatives and US critical infrastructure security.

7 Elements

7 Elements

7 Elements is an independent IT security testing company providing expertise in technical information assurance through security testing, incident response and consultancy.

Infortec

Infortec

Infortec provide consultancy and solutions for the protection of digital information and the management of computer resources.

ThreatAware

ThreatAware

Total visibility of your business cybersecurity. Monitoring, management and compliance for your cybersecurity tools, people and processes from one easy to use dashboard.

Tenzir

Tenzir

Tenzir's primary focus lies on network forensics: the systematic investigation of cyber attacks with big data analytics.

Volon Cyber Security

Volon Cyber Security

Volon is a cyber security consulting firm that offers specialized solutions for corporates and governments in Cyber Threat Intelligence.

Barbara IoT

Barbara IoT

Barbara is an industrial device platform specifically designed for IoT deployments.

White & Black

White & Black

White & Black are specialist corporate & technology lawyers based in London & Oxford.

Black Hills Information Security (BHIS)

Black Hills Information Security (BHIS)

Black Hills Information Security provide security testing and vulnerability assessment services.

BlueSwarm

BlueSwarm

With a team spanning over 4 continents, Blueswarm helps protect customers from nefarious cyber attackers.

BullWall

BullWall

BullWall is a digital innovator dedicated to fight cybercrime in its many forms. Our overarching purpose is to stop new and unknown strings of ransomware attacks in its tracks.

Auvik Networks

Auvik Networks

Auvik is easy-to-use cloud-based networking management and monitoring software - true network visibility and control without the hassle.

Hadrian

Hadrian

Hadrian is modernizing offensive security practices with automation, making them faster and more scalable. Equipped with the hacker’s perspective, companies can now know what their critical risks are.