BUSINESS > Services > Law


« Back to News

2019-07-30

GDPR Requires Better Methods Of Authentication

GDPR has brought a much tighter data protection regime and compliance should move organisations towards having much stronger user authentication.

2019-07-11

BA Faces £183m Data Breach Fine

British Airways will be fined the biggest penalty handed out by the UK regulator so far and the first one to be made public under new GDPR rules.

2019-07-11

US Electoral Infrastructure Is Wide Open To Hackers

Most US electronic voting systems are nothing but bare-bone, decade old computer systems that lack even rudimentary endpoint security.

2019-07-09

Improving Electric Power-Grid Security

Going Backwards To Go Forwards: US legislators want to mandate 'retro' analogue control systems in US Power stations to improve cyber-resilience.

2019-06-25

Clayden Law: GPPR Is 1-Year Old

An Guide To GDPR From Clayden Law: Experts in Information Technology, Data Privacy & Cyber Security.

2019-07-03

GDPR Is Now 1-Year Old

Clayden Law's Guide to GDPR: One year after its introduction, now is a very good time for organisations to review their GDPR compliance.

2019-07-02

Tackling The ‘Splinternet’

Rapid advances in technical capabilities and the associated rise in security threats have overtaken effective regulation in the digital economy.

2019-06-20

TalkTalk Hacker Jailed

Daniel Kelley became a "Black Hat" hacker when he failed to get the GCSE grades to get on to a computer course. Now he's been jailed for 4 years.

2019-06-19

Now Is Definitely Time To Check You Are GDPR Compliant

As the risk of a punitive fine grows, it is vital to verify that your organisation is GDPR compliant. There are four key areas to consider.

2019-06-03

Mueller Reports On Russian Interference

Moscow's interference in the 2016 election was unequivocal & emphatic & used "sophisticated cyber techniques", hacking networks and email.

2019-06-13

Wanted: An International Cyber Security Law

The global Domain Name System (DNS) is a central part of the internet and it needs to have legal protection by international treaty.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

InformationWeek

InformationWeek

InformationWeek is the world's most trusted online community for business technology professionals like you.

SOTI

SOTI

SOTI is an industry leader in Enterprise Mobility Management (EMM).

Ubiq Security

Ubiq Security

Ubiq has developed a software solution that secures any type of data, on any device, anywhere, with nearly no impact to system performance or user experience.

CryptoTec

CryptoTec

CryptoTec is a provider of security concepts and encryption solutions for secure communication between decentralized computerized systems.

PSW Group

PSW Group

PSW Group is a full-service Internet solutions provider with a special focus on Internet security.

Fedco International

Fedco International

Fedco International is an IT and SCADA ICS Security consultancy firm.

Cyberarch Consulting

Cyberarch Consulting

Cyberarch is a security-focused consulting firm. We provide services specializing in information security, digital forensics, penetration testing and cyber security training.

CyberSN

CyberSN

CyberSN matches cybersecurity professionals to jobs and removes the pain from job searching and hiring.

HunCERT

HunCERT

HunCERT's mission is to assist Hungarian Internet Service Providers in applying appropriate procedures to address the risks of computer network incidents and to respond to such incidents.

Cyber Lockout

Cyber Lockout

Comprehensive ransomware insurance and preventative cybersecurity technology solution, working together to help protect businesses 24/7/365.

Mitnick Security

Mitnick Security

Mitnick Security is a leading global provider of information security consulting and training services.

Zuul IoT

Zuul IoT

Zuul take an asset-centric approach to OT security, enabling security teams to protect the critical IIoT/IoT devices that are at the foundation of critical business functions.

Trojan Horse Security

Trojan Horse Security

Trojan Horse Security are specialists in corporate security. Our services include: Comprehensive Cyber Security Analysis, Penetration Testing, Network Security and Security Audits.

Cysurance

Cysurance

Cysurance is a next-generation risk mitigation company that insures, warranties and certifies security solutions.

ImagineX Consulting

ImagineX Consulting

ImagineX Consulting is a cybersecurity-focused boutique technology consultancy whose mission is to help our clients #BeBetter by reducing their corporate risk.

SydeLabs

SydeLabs

At SydeLabs, our mission is to ensure the comprehensive security of your AI systems.