BUSINESS > Services > Law


« Back to News

2017-06-12

Uber In Legal Fight With Google

Uber has fired the engineer accused of stealing secrets from Google after he failed to assist with an investigation related to the lawsuit.

2017-06-13

China Postpones Implementing New Cybersecurity Law

China wants new rules to control how companies store and use information, protect privacy and prevent crime & terrorism. Not everyone is happy.

2017-06-05

Five Pitfalls of Cybersecurity Insurance

Businesses are increasingly considering investing in cybersecurity insurance. But insurance is only as effective as the scope of the coverage.

2017-06-02

Eight Steps To The GDPR Countdown

GDPR will dramatically affect how businesses work with the personal data of citizens and residents of the European Union.

2017-05-31

EU’s New Data Rules Are 1 Year Away

May 25 2018 is a date that should be etched in red on the calendar of any company that does business in the European Union

2017-05-25

Attitudes To Facebook Are Changing

Facebook's vast scale has allowed it to amass an almost unrivalled amount of data on citizens around the world. The EU is growing concerned.

2017-05-23

Data Breaches & The Internet of Things

The IoT opens up new pathways for hackers. Are new laws needed to protect consumers and to govern disclosure of data breaches?

2017-05-23

Uber Faces A Criminal Probe In The US

Ride-sharing firm Uber firm is accused of using "secret" software that lets it operate in regions where its service is banned or restricted.

2017-05-18

UK Proposes Online Surveillance In Real-Time

The "live" surveillance of British web users' internet communications is proposed in a draft technical paper prepared by the UK government.

2017-05-02

Snowden Can Stay In Russia For As Long As He Likes

The former NSA contractor has been living in Russia since 2013, after leaking thousands of classified intelligence documents and fleeing the US.

2017-05-02

EU / US Privacy Shield Affects Your Organisation

Although we live in a world where data transfer is easier from a technical standpoint, location is increasingly important from a legal perspective.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Privacy Professor

Privacy Professor

Privacy Professor provides information privacy, security and compliance services, tools and products to organizations in a wide range of industries.

Centurion Information Security

Centurion Information Security

Centurion Information Security is a consulting firm based in Singapore that specialises in penetration testing and security assessment services.

Arcanum Information Security (AIS)

Arcanum Information Security (AIS)

Arcanum Information Security is a specialist Information Assurance Consultancy and a leading provider of Cyber Security services to UK Defence, UK Government, Enterprise businesses and SMEs.

Seconize

Seconize

Seconize empowers enterprises to proactively manage their cyber risks, prioritize remediations, optimize security spending and ensure compliance.

CYBRScore

CYBRScore

CYBRScore is a premium, performance-based cyber skills training and assessment provider that quantifies a user’s ability to defend a network.

Boxphish

Boxphish

Boxphish provides a proven solution to reduce Human Error and Cyber Human Risk via automated learning journeys and intelligent phishing simulations.

NASK SA

NASK SA

NASK SA is an integrator of telecommunications services. We provide advanced ICT security services, collocation and hosting, data centre services, and build corporate networks.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

SecurityGen

SecurityGen

SecurityGen is a global cybersecurity start-up focused on telecom security, with a focus on 5G networks.

Red Goat Cyber Security

Red Goat Cyber Security

Red Goat Cyber Security have created excellent, informative and interactive Social Engineering Awareness training which is suitable for all levels of staff.

Bright Data

Bright Data

Bright Data Inc is the world’s #1 web data platform, enabling organizations to research, monitor, analyze data, and make better decisions.

Arctic Group

Arctic Group

Arctic Group is a Swedish service provider focusing on cybersecurity, integration services and deployment of software development tools.

Getronics

Getronics

Getronics guides customers through their own transformation journeys, leveraging an integrated and secure-by-design IT portfolio.

TheHive Project

TheHive Project

TheHive Project is a Scalable, Open Source and Free Security Incident Response Platform for SOC, CSIRT and CERT teams.

CommandK

CommandK

CommandK provides companies with infrastructure to protect their sensitive data. Built-in solutions to prevent data-leaks and simplify governance.

Bit Sentinel

Bit Sentinel

Bit Sentinel is an information security company. We help companies like yours discover, prioritize, and effectively remediate potential cybersecurity risks.