BUSINESS > Services > Law


« Back to News

2018-04-30

Six Steps to Protect Customer Data

Data abuse and mishandling can have grave consequences. The Internet Society has six recommendations to promote trust among users.

2018-04-07

GDPR Countdown

When did your company become aware of the General Data Protection Regulation and the need to do something about it?

2018-04-18

Regulation Might Actually Protect Facebook

Regulation might actually protect Facebook from competitors. Breakup, not regulation, is the threat that Mark Zuckerberg really fears.

2018-04-18

What Does GDPR Mean For the Retail Industry?

Retailers collect masses of personal data from customers/client emails and payment details. All shortly to be subject to GDPR. By Alfred Rolington

2018-04-16

Australia’s Cybersecurity Adviser Calls For Privacy

Australia's national cybersecurity adviser has urged social media companies to improve the way they treat personal data.

2018-04-11

Cambridge Analytica, Facebook & GDPR

The UK Information Commissioner has her work cut out deciding if there has been any illegality in her jurisdiction. Would it be different after GDPR?

2018-04-06

Using GDPR Compliance To Excel At CRM

GDPR offers an unprecedented opportunity for businesses to provide better data security and privacy services to their customers.

2018-04-03

Data Protection Officer's Guide To The GDPR Galaxy

Is the imminent GDPR deadline got you freaking out? These five tips might help you calm down, at least a little bit.

2018-03-27

Five Steps To Keeping Your Cloud GDPR Compliant

The GDPR gives the balance of power concerning personal data to the individual rather than companies collecting it. That could be painful.

2018-03-27

LinkedIn Updates Policies For GDPR

LinkedIn is making changes that will impact the user agreement, privacy policy, cookie policy and professional community policies in time for GDPR.

2018-03-26

Equifax: Insider Trading Charges

An Equifax executive faces charges of insider trading based upon confidential information about a data breach affecting data of 140 million people.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

EfficientIP

EfficientIP

EfficientIP helps organizations drive business efficiency through agile, secure and reliable network infrastructures.

Orange Cyberdefense

Orange Cyberdefense

Orange Cyberdefense is the expert cybersecurity business unit of the Orange Group, providing managed security, managed threat detection & response services to organizations around the globe.

Fluency Security

Fluency Security

Fluency is the only Security Analytics & Orchestration (SAO) solution that automates correlation, detection, validation and ongoing tracking.

SailPoint

SailPoint

SailPoint provides identity governance solutions with on-premises and cloud-based identity management software for the most complex challenges.

ADL Process

ADL Process

ADL Process offer secure data destruction, certified product destruction and responsible electronics recycling services to businesses and institutions.

Visium Technologies

Visium Technologies

Visium Analytics provides innovative data visualization, cybersecurity technologies and solutions to businesses to protect and secure their data assets.

Threat Status

Threat Status

Threat Status are a Threat Intelligence company. We are the developers of Trillion. A cloud based Security As A Service (SaaS) platform.

Tracepoint

Tracepoint

Tracepoint provide full-service cyber incident response, remediation and recovery solutions for the most time-sensitive situation your company may ever face.

Wavex Technology

Wavex Technology

Wavex Technology is an award winning IT Services firm offering clients a secure and fully managed IT service.

Eureka Security

Eureka Security

Eureka help organizations securely use any cloud data storage technology they need without having to compromise on security.

Celera Networks

Celera Networks

Celera Networks is a managed services provider specializing in cybersecurity, cloud and managed IT services.

HADESS

HADESS

We are "Hadess", a group of cyber security experts and white hat hackers.

NormCyber

NormCyber

NormCyber provide award-winning cyber security and data protection as a service for midsize organisations.

Block Harbor Cybersecurity

Block Harbor Cybersecurity

Block Harbor has worked closely with automakers, suppliers, and regulators since 2014 on vehicle cybersecurity.

Borwell

Borwell

Borwell delivers software and IT solutions to the UK MoD and to UK Government departments, which are secure by design.

Qubika

Qubika

Qubika are shaping the future of next-generation applications by seamlessly integrating high-quality UX, robust security, and AI-driven intelligence.