BUSINESS > Services > Law


« Back to News

2025-02-10

Apple Ordered To Give Access To Users' Encrypted Data

Investigatory Powers: British law enforcement have demanded access to encrypted data stored by Apple users in its global cloud service.

2025-02-10

New Laws To Prevent Using AI To Generate Sexual Images

Punishable By Five Years in Prison: Britain is to introduce new laws to tackle the misuse of AI tools behind the creation of abusive child imagery.

2025-01-21

A New Era Of Digital Resilience For The EU

DORA Takes Effect: As cyber threats grow in complexity and with a growing reliance on digital infrastructure, DORA is a vital step. By Jamie Moles

2025-01-11

British Online Safety Act Takes Effect

Online platforms have three months to assess the risk of their users encountering illegal content and implement safety measures or face prosecution.

2025-01-06

Apple Will Pay $95m Penalty For Misusing Siri

Apple will have pay $95m to settle a case which claimed that its Siri virtual assistant was listening in to Apple users without their permission.

2024-12-09

TikTok Will Be Banned In The USA

Censorship & The Rule Of Law: A Federal Court has upheld the law which requires TikTok to sell or close it US operation by early 2025.

2024-11-22

Google Faces Order To Divest Chrome

Legal Remedy: A US court ruling that Chrome operates a monopoly in Inernet search may soon result in Google being ordered to sell the business.

2024-11-20

Ireland Orders X, TikTok & Instagram To Cut Terrorist Content

The Irish media commission gave the social media platforms 12 weeks to make “effective, targeted & proportionate” measures to stop terrorist content.

2024-10-30

How Do The UK Cyber Security & Resilience Bill & The EU's NIS2 Compare?

Business operating in both regimes can expect to have to meet both UK & EU regulations and so will need to seek harmonization. by Innes Muir

2024-10-25

What Security Teams Need To Know About The EU’s NIS 2 Directive

Act Now: The NIS 2 Directive brings significant changes and increased obligations for organizations across the EU & beyond. By Graham Rance

2024-10-01

Six Steps On The Road To NIS2 Compliance

NIS2 is the EU’s stringent new cybersecurity Directive and member states have until 17th October to ratify it into national law. By Martin Davies

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Softtek

Softtek

Softtek helps its clients to gain a competitive edge by implementing digital solutions that propel their business strategies.

FedRAMP

FedRAMP

FedRAMP, is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.

SANS CyberStart

SANS CyberStart

SANS CyberStart is a unique and innovative suite of tools and games designed to introduce children and young adults to the field of cyber security.

EvoNexus

EvoNexus

EvoNexus is a technology startup incubator with locations in San Diego, Orange County, and Silicon Valley.

RhodeCode

RhodeCode

RhodeCode is an open source repository management platform. It provides unified security and team collaboration across Git, Subversion, and Mercurial.

Cognyte

Cognyte

Cognyte is a global leader in investigative analytics software that empowers a variety of government and other organizations with Actionable Intelligence for a Safer World.

Axellio

Axellio

Axellio provides economic, end-to-end cyber security solutions designed for your team, environment, and security objectives, providing packet level visibility across your network.

Pratum

Pratum

Pratum is an information security services firm that helps clients solve challenges based on risk, not fear.

Kiteworks

Kiteworks

Kiteworks (formerly Accellion) creates a dedicated Private Content Network that ensures zero-trust private content protection and compliance.

Kirk ISS

Kirk ISS

Kirk ISS are the leading provider of IT services in the Cayman Islands. We offer best-in class hardware, software, communications and cloud computing, all backed by professional services support.

Wadilona Cyber Securities

Wadilona Cyber Securities

Wadilona Cyber Securities' sole aim is to bring and secure Information and Communications Technology (ICT) to and work for humans in its simplest terms.

Securin

Securin

Securin offers a comprehensive portfolio of solutions including Attack Surface Management, Vulnerability Intelligence, Penetration Testing, and Vulnerability Management.

RADICL

RADICL

RADICL's mission is to give SMBs that serve America's Defense Industrial Base (DIB) access to strong, enterprise-grade cyber security protection.

Badge

Badge

Badge authenticates you on-demand for every application, on any device, without storing any secrets.

Inveo Group

Inveo Group

Inveo group is the Italian leader for the management of privacy and data protection issues.

EyBrids

EyBrids

As a forward-thinking cybersecurity consulting firm, we believe that robust security is the foundation for innovation and growth in today’s digital landscape.