BUSINESS > Services > Law


« Back to News

2016-08-10

European Privacy Directive: Encryption Without Backdoors

The EU rules designed to protect privacy in electronic communications need to reflect the world that exists today.

2016-08-13

UK Security Agencies Say Mass Internet Spying Is Crucial

Privacy Trial Begins: UK spy agencies contend that interception of communications is critical in protecting the country against terrorism.

2016-08-05

Data Protection Tips for Proposed US Cybersecurity Laws

Proposed new US cybersecurity legislation is making many businesses nervous. These tips will help you be prepared.

2016-07-28

Major Privacy Win For Microsoft in 'free for all' Data

The US government cannot force Microsoft to give authorities access to the firm's servers located in other countries, a court has ruled.

2016-07-19

UK IP Bill Will Allow Government To Spy On Journalists

The Investigatory Powers Bill will allow the UK Intelligence services and Police to monitor and access journalist Internet, phone & data records.

2016-07-17

US and EU Implement Privacy Shield

EU promises its citizens to restore trust when their personal information is transferred to the US by multinational companies.

2016-07-08

Brexit Fallout Continues – ePrivacy

UK losing influence over the EU review of online privacy laws just as the long-running dispute over transatlantic data transfers appears to be settled.

2016-06-29

Charge Companies for Cyber Security Failures

British MPs recommended that companies should be fined if they fail to guard against cyber-attacks, following last year's TalkTalk hack.

2016-06-27

Snowden Calls For Special Protection For Whistleblowers

Should there be special protection for government employees who break secrecy laws? Safe in Moscow, Edward Snowden thinks so.

2016-06-24

UK’s Cybersecurity Policy For Business

Despite some policy confusion, the British government has decided to embrace cloud computing as a way of combating cyber-attacks.

2016-06-10

NSA Has ‘No Idea’ How Many American Citizens It’s Spying On

The NSA monitors the electronic communications of millions of people to find foreign threats. How many US citizens are caught up ?

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CertiKit

CertiKit

CertiKit produce toolkit products that accelerate the adoption of ISO/IEC standards, including ISO 27001, helping organizations all over the world to realize the benefits as soon as possible.

IMS Networks

IMS Networks

IMS Networks specializes in the design and management of high criticality networks and telecoms services including network security and Managed Security Services.

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC) is a government body providing support for ICT related activities including formulating national ICT strategy and policy.

Carbonite

Carbonite

Carbonite offers all the tools necessary for protecting data from the most common forms of data loss, including ransomware, accidental deletions, hardware failures and natural disasters.

Binary Defense

Binary Defense

Binary Defense protect businesses of all sizes through advanced cybersecurity solutions including Managed Detection and Response, Security Information and Event Management and Counterintelligence.

Voxility

Voxility

Voxility provides Infrastructure-as-a-Service in the biggest Internet hubs in the world.

Sentinel

Sentinel

Sentinel works with governments, media and defence agencies to help protect democracies from disinformation campaigns by developing a state-of-the-art AI detection platform.

Bionic

Bionic

Bionic is an agentless way to get control over your increasingly complex applications so you can manage, operate, and secure them faster and more efficiently.

Zemana

Zemana

Zemana provides innovative cyber-security solutions to deal with complex malicious software and other cyber threats.

FiVerity

FiVerity

FiVerity provides financial institutions with cyber fraud defense to combat a dangerous and growing threat - the convergence of fraud-related theft with sophisticated, high-volume cyber attacks.

SnapAttack

SnapAttack

SnapAttack is a collaborative platform that empowers your security team to stay ahead of threats, create robust behavioral analytics for your existing tools, and prove your program's effectiveness.

Glasstrail

Glasstrail

Glasstrail are single-minded about helping organisations gather intelligence and manage vulnerabilities in their attack surface before adversaries exploit them.

White Knight Labs

White Knight Labs

White Knight Labs is a cyber security consultancy that specializes in cybersecurity training.

DACTA Global

DACTA Global

DACTA was established with the aim of simplifying the perception of complexity surrounding digital security challenges and solutions.

Vambrace Cybersecurity

Vambrace Cybersecurity

Vambrace is an experienced cybersecurity consultancy and operations outsourcer helping you to secure your business in an increasingly-hostile cyber environment.

SixMap

SixMap

SixMap is a continuous threat exposure management platform that automatically provides comprehensive enterprise visibility, contextual threat intelligence, and a suite of remediation actions.