BUSINESS > Services > Law


« Back to News

2018-05-02

Blockchain And GDPR: A Rock And A Hard Place

The GDPR is centralised, restricted and removable while Blockchain is decentralised, distributed and immutable. That's quite a contradiction.

2018-05-01

Cybersecurity Advice For SMEs

Cybersecurity threats to business originate in the 1980s but many smaller organisations still don't understand the risks to their electronic systems.

2018-04-23

A New Distributed Database Adds GDPR Controls

The company with a terrible name introduces a useful new cloud data product to facilitate automated multi-territory compliance with GDPR.

2018-04-19

Offensive Cyberattacks Must Balance Lawful Deterrence & The Risks Of Escalation

A government contemplating the use of offensive cyber operations will need to consider the precedents – or the lack of them.

2018-04-24

Six Myths About GDPR

Despite months of publicity about GDPR, including the potential benefits of compliance, very few organisations are ready for the May 25 mandate.

2018-04-30

Six Steps to Protect Customer Data

Data abuse and mishandling can have grave consequences. The Internet Society has six recommendations to promote trust among users.

2018-04-07

GDPR Countdown

When did your company become aware of the General Data Protection Regulation and the need to do something about it?

2018-04-18

Regulation Might Actually Protect Facebook

Regulation might actually protect Facebook from competitors. Breakup, not regulation, is the threat that Mark Zuckerberg really fears.

2018-04-18

What Does GDPR Mean For the Retail Industry?

Retailers collect masses of personal data from customers/client emails and payment details. All shortly to be subject to GDPR. By Alfred Rolington

2018-04-16

Australia’s Cybersecurity Adviser Calls For Privacy

Australia's national cybersecurity adviser has urged social media companies to improve the way they treat personal data.

2018-04-11

Cambridge Analytica, Facebook & GDPR

The UK Information Commissioner has her work cut out deciding if there has been any illegality in her jurisdiction. Would it be different after GDPR?

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Versasec

Versasec

Versasec is a leader in identity and access management, providing customers with security solutions for managing digital identities.

ARC Advisory Group

ARC Advisory Group

ARC is a leading technology research and advisory firm with expertise in both information technologies (IT) and operational technologies (OT)

C3.ai

C3.ai

The C3 AI Suite supports configurable, pre-built, high value AI applications for predictive maintenance, fraud detection, anti-money laundering, sensor network health and more.

Document Security Systems (DSS)

Document Security Systems (DSS)

DSS anti-counterfeit, authentication, and brand protection solutions are deployed to prevent attacks which threaten products, digital presence, financial instruments, and identification.

ThreatModeler

ThreatModeler

ThreatModeler is an automated threat modeling solution that fortifies an enterprise’s Software Development Lifecycle by identifying, predicting and defining threats.

ScorpionShield

ScorpionShield

ScorpionShield CyberSecurity is an EC-Council Accredited Training Center, and an On-Demand Service for Cybersecurity professionals.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

RankedRight

RankedRight

RankedRight empowers security teams to take immediate action on their most critical risks.

DH2i

DH2i

DH2i is a leading provider of multi-platform Software Defined Perimeter and Smart Availability software enabling customers to create an entire IT infrastructure that is always-secure and always-on.

Goldilock

Goldilock

Goldilock is redefining how sensitive data, devices, networks and critical infrastructure can be secured.

Anjuna Security

Anjuna Security

Software from Anjuna Security effortlessly enables enterprises to safely run even their most sensitive workloads in the public cloud.

Zenzero

Zenzero

Zenzero simplifies technology adoption and supports our customers through managed and outsourced IT support.

SysGroup

SysGroup

SysGroup is an award-winning managed IT services, cloud hosting, and IT consultancy provider.

Deimos

Deimos

Deimos is a technology, cloud, hybrid and multi-cloud focused, professional services company. Our expertise and focus is on cloud native Developer and Security Operations.

X-PHY

X-PHY

X-PHY is a pioneering cybersecurity company dedicated to hardware-based cybersecurity solutions that protect data at its core.

Pillar Security

Pillar Security

Pillar Security are building the unified AI security platform to identify, assess, and mitigate security risks across your entire AI lifecycle.