BUSINESS > Services > Law


« Back to News

2016-05-11

Spying On You In Britain

Since the late 1990s UK agencies have collected bulk personal data about many people who are “unlikely to be of intelligence or security interest”.

2016-05-06

As the Snowden Leaks Began… There Was "fear and panic" in The US Government. There Still Is.

US Lawmakers are demanding that the Obama administration reveals how many Americans have been subject to domestic surveillance programs.

2016-05-04

Implementing EU Privacy Laws Requires 28,000 New Data Professionals

European companies will need to hire over 28,000 new data protection officers to comply with EU General Data Protection Regulations.

2016-04-26

EU General Data Protection Regulation Finally Passes

A two-year implementation process will begin the final step to completion before the regulation becomes EU law.

2016-04-29

EU Data Chiefs Call For Rethink Of Privacy Shield

EU data protection bosses have confirmed they have rejected the proposed Privacy Shield data transfer agreement with US.

2016-04-29

Google Faces EU Monopoly Law Over Android Dominance

Google has been issued formal antitrust charges over claims that it abuses the dominant position of its Android operating system.

2016-04-20

Do The #PanamaPapers Make All Law Firms A Target?

Will hacking groups think all global law firms are as vulnerable as Mossack Fonseca and therefore target them in new, more persistent ways?

2016-04-11

Eight Reasons Why US CEOs Care About New EU Privacy Laws

A major change is on the way in how American companies must handle European citizens’ personal data.

2016-04-11

Taliban App Removed From Google Store

Alemarah, an app for Android phones created by Islamist fundamentalist group the Taliban, has been removed from Google's Play Store.

2016-04-06

UK Surveillance Powers Bill Could Force Startups To Build In Backdoors

The UK's proposed new surveillance law enables state agencies to compel even very small startups to build backdoors into their systems.

2016-04-11

CIOs Fear Fines From New EU Data Laws

CIOs are concerned their current security policies put them at risk of serious fines under new European data protection laws.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Protegrity

Protegrity

Protegrity is an enterprise and cloud data security software for data-centric encryption and tokenization to protect sensitive data while maintaining usability.

Cloudbric

Cloudbric

Cloudbric is a cloud-based web security service, offering award-winning WAF, DDoS protection, and SSL, all in a full-service package.

Keyfactor

Keyfactor

Keyfactor is a leader in cloud-first PKI as-a-Service and crypto-agility solutions. Our Crypto-Agility Platform seamlessly orchestrates every key and certificate across the enterprise.

North American Electric Reliability Corporation (NERC)

North American Electric Reliability Corporation (NERC)

NERC is a not-for-profit international regulatory authority whose mission is to assure the reliability and security of the bulk power system in North America.

Cipher Tooth

Cipher Tooth

CipherTooth is a superior system for delivering secure content over the Internet.

Blue Lights Digital

Blue Lights Digital

Blue Lights Digital have developed a range of platforms to support digital investigations, as well as providing continued support and education for investigations professionals.

J2 Software

J2 Software

J2 Software is a leading African Information Security and ICT business providing information security, governance, risk and compliance solutions.

Volexity

Volexity

Volexity is a leading provider of threat intelligence and incident suppression services and solutions.

Gita Technologies

Gita Technologies

Gita Technologies works to create integrated solutions to the thorniest problems in the field of intelligence and cyber today.

BrandShelter

BrandShelter

BrandShelter specializes in providing online brand protection for companies and trademark owners.

BIO-key

BIO-key

BIO-key is a pioneer and innovator, we are recognized as a leading developer of fingerprint biometric authentication and security solutions.

LTIMindtree

LTIMindtree

LTIMindtree is a new kind of technology consulting firm. We help businesses transform – from core to experience – to thrive in the marketplace of the future.

YorCyberSec

YorCyberSec

YorCyberSec act as a trusted Cyber and Information Security broker and procurement specialist. We help companies to Reduce Risk, Increase Assurance and Improve Performance.

Bluefin Payment Systems

Bluefin Payment Systems

Bluefin is the recognized integrated payments leader in encryption and tokenization technologies that protect payments and sensitive data.

Plerion

Plerion

Plerion is an all-in-one Cloud Security Platform that supports workloads across AWS, Azure, and GCP delivering cloud security posture management, workload security, data security and more.

Francisco Partners

Francisco Partners

Francisco Partners provide capital, expertise, and support for growth-aspiring technology companies.