BUSINESS > Services > Law


« Back to News

2020-06-15

Facebook Criticised For Workplace Suppression Controls

Facebook's Workplace is an office collaboration product with powerful tools for employers to monitor and control discussions in the workplace.

2020-06-15

Journalist Convicted of Cyber Libel

A charge of 'Cyber Libel' has been used by the Philippine Government to convict a journalist under legislation designed to control pornography.

2020-06-12

Google Faces Lawsuit For Tracking Users In Privacy Mode

Google gathers data through Google Analytics, Ad Manager, smartphone apps and other applications, even after users think they have gone private.

2020-06-05

What Can Hold Up Your International Project?

The term “export controls” is enough to send most people to sleep, but in the cybersecurity world it can have often unforeseen consequences.

2020-06-02

Customer Compensation Claim Follows The EasyJet Hack

EasyJet faces a liability of £18 billion from a class action claim filed in London on behalf of the airline's customers hit by a data breach.

2020-04-08

The Risks Of Remote Working

Enforced remote working during the Covid-19 lockdown leaves users especially vulnerable and now top APT- level hackers are getting involved.

2020-04-20

Singapore Introduces Home Cyber Security Labelling

Singapore is one of the first countries to require labels on Wi-Fi routers, home hubs and other IoT devices to strengthen domestic cyber security.

2020-03-28

New Guidelines For Maritime Cyber Security

Cyber attacks on maritime freight may result in severe operational failures and new guidelines aim to contain threats from phishing emails & malware.

2020-03-25

How Does The CCPA Compare To The GDPR?

Both the GDPR and the CCPA emphasize the need for companies to implement user privacy protection, but there are important differences.

2020-02-26

Canada's Government Breaks The Rules

Numerous federal departments and national agencies have been mishandling the personal data of thousands of Canadian citizens.

2020-02-17

GDPR's Impact In The US And Globally

Outside of the European Union you might think that it doesn’t apply to you, but GDPR affects organisations and businesses worldwide.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Quttera

Quttera

Quttera provides Website Security Solutions for Small & Medium Businesses, Enterprises and Organizations.

MarQuest

MarQuest

MarQuest provides services and systems to enhance network reliability and security.

Telia Cygate

Telia Cygate

Cygate are specialists in information security, data networks, and data centre and cloud technologies.

BigID

BigID

BigID is redefining personal data protection and privacy. BigID software helps companies secure their customer data & satisfy privacy regulations like GDPR.

Kuratorium Sicheres Österreich (KSO)

Kuratorium Sicheres Österreich (KSO)

KSO is an independent non-profit association that has set itself the goal of making Austria safer as a national networking and information platform for topics of internal security.

Advens

Advens

Advens is a company specializing in information security management. We provide Consultancy, Security Audits and Technology Solutions.

Cyber Threat Alliance

Cyber Threat Alliance

CTA is working to improve cybersecurity of our digital ecosystem by enabling near real-time cyber threat information sharing among companies and organizations in the cybersecurity field.

Take Five

Take Five

Take Five is a national campaign offering straight-forward, impartial advice that helps prevent email, phone-based and online fraud – particularly where criminals impersonate trusted organisations.

Horizon3.ai

Horizon3.ai

Horizon3.ai is a leader in security assessment and validation enabling continuous security overwatch from an attacker’s perspective through our NodeZero SaaS solution.

Infuse Technology

Infuse Technology

Infuse Technology provide the highest level of cybersecurity support, implementing practical solutions to protect against cyber-attacks, from simple phishing scams to complex data security breaches.

Cyber Tzar

Cyber Tzar

Cyber Tzar is a new approach at dealing with an old problem; assessing and managing risks to your IT estate.

Mutare

Mutare

For three decades, Mutare has been empowering organizations to re-imagine a better way to connect through our transformative voice security, digital voice and text messaging solutions.

Lodestone

Lodestone

Lodestone partners with clients to help them mitigate business and reputational risk, through our human-based, approach to cyber security, digital forensics and incident response.

CloudCoCo

CloudCoCo

CloudCoCo help UK businesses of all sizes and industries succeed by providing enterprise-grade technology at small-business prices.

Antivirus Tales

Antivirus Tales

Antivirus Tales offers a platform to resolve all types of antivirus-related issues. The platform also provide various blog articles and informative guides to fix antivirus software errors.

Secure Blink

Secure Blink

Secure Blink provides automated application and API security solutions that empower developers and security engineers to protect critical assets from exploitation.