BUSINESS > Services > Law


« Back to News

2016-06-29

Charge Companies for Cyber Security Failures

British MPs recommended that companies should be fined if they fail to guard against cyber-attacks, following last year's TalkTalk hack.

2016-06-27

Snowden Calls For Special Protection For Whistleblowers

Should there be special protection for government employees who break secrecy laws? Safe in Moscow, Edward Snowden thinks so.

2016-06-24

UK’s Cybersecurity Policy For Business

Despite some policy confusion, the British government has decided to embrace cloud computing as a way of combating cyber-attacks.

2016-06-10

NSA Has ‘No Idea’ How Many American Citizens It’s Spying On

The NSA monitors the electronic communications of millions of people to find foreign threats. How many US citizens are caught up ?

2016-05-31

Companies Should Share Cyberattack Information

Disclosure of data breaches might help strengthen cybersecurity for everyone.

2016-05-11

Spying On You In Britain

Since the late 1990s UK agencies have collected bulk personal data about many people who are “unlikely to be of intelligence or security interest”.

2016-05-06

As the Snowden Leaks Began… There Was "fear and panic" in The US Government. There Still Is.

US Lawmakers are demanding that the Obama administration reveals how many Americans have been subject to domestic surveillance programs.

2016-05-04

Implementing EU Privacy Laws Requires 28,000 New Data Professionals

European companies will need to hire over 28,000 new data protection officers to comply with EU General Data Protection Regulations.

2016-04-26

EU General Data Protection Regulation Finally Passes

A two-year implementation process will begin the final step to completion before the regulation becomes EU law.

2016-04-29

EU Data Chiefs Call For Rethink Of Privacy Shield

EU data protection bosses have confirmed they have rejected the proposed Privacy Shield data transfer agreement with US.

2016-04-29

Google Faces EU Monopoly Law Over Android Dominance

Google has been issued formal antitrust charges over claims that it abuses the dominant position of its Android operating system.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Garrison Technology

Garrison Technology

Garrison SAVI® is a unique technology for secure remote browsing that can dramatically change the risk profile for enterprise cyber security.

Commonwealth Cybercrime Initiative (CCI)

Commonwealth Cybercrime Initiative (CCI)

The CCI unites 35 international organisations contributing to multidisciplinary programmes in Commonwealth countries. These organisations form the CCI Consortium.

Utility Cyber Security Forum

Utility Cyber Security Forum

The Utility Cyber Security Forum offers a focused venue in which utility executives can network one-on-one with colleagues facing issues in protecting against cyber attacks.

Deepwatch

Deepwatch

The Deepwatch Platform helps organizations reduce risk through early and precise threat detection and remediation.

BullGuard

BullGuard

BullGuard is an award-winning cybersecurity company focused on providing the consumer and small business markets with the confidence to use the internet in absolute safety.

Emagined Security

Emagined Security

Emagined Security is a leading provider of professional services for Information Security and Compliance solutions.

Alias Robotics

Alias Robotics

Alias Robotics is a robot cyber security company. We deliver cyber security solutions for robots and robot components.

Velta Technology

Velta Technology

Velta Technology provide digital safety and cybersecurity solutions for the industrial space.

Digital Silence

Digital Silence

Digital Silence is a world-class provider of information security research and consulting services.

Virtual Technologies Group (VTG)

Virtual Technologies Group (VTG)

Virtual Technologies Group is a single source, IT product and services provider for SMBs and IT departments, delivering reliable, cost-efficient service, maintenance and support solutions.

Obsidian Security

Obsidian Security

Protect your business-critical applications by mitigating threats and reducing risk with Obsidian, the first truly comprehensive security solution for SaaS.

Indian Cyber Security Solutions (ICSS)

Indian Cyber Security Solutions (ICSS)

Indian Cyber Security Solutions is an Enterprise Cyber Security Platforms company offering Cyber Security & Technical Education and Compliance & Penetration Testing Services.

Skyhigh Security

Skyhigh Security

Skyhigh Security enables your remote workforce while addressing your cloud, web, data, and network security needs.

Hushmesh

Hushmesh

Hushmesh is a start-up aimed at securing the world’s digital infrastructure by developing develop the Mesh, a global information space with automated security built in.

Prescott

Prescott

Prescott acts as your guiding light in the preparation for your CMMC assessment and long after by governing your cybersecurity practice.

OOKOS

OOKOS

OOKOS was founded in 2023 by a team of cybersecurity veterans who recognized that traditional security models were failing to keep pace with evolving threats.