BUSINESS > Services > Law


« Back to News

2016-03-23

Former CIA Director Calls Out The FBI Over iPhone Backdoor

The FBI’s demand that Apple create a custom version of iOS that would allow them to hack an iPhone has Americans divided into two camps.

2016-03-21

Now Surveillance 'aggressive-invasive': Snowden

Edward Snowden, known for revealing the extent of surveillance by US intelligence, says it is "more aggressive and invasive today than it was before".

2016-06-24

'Brexit' Could Put Data Sharing in Jeopardy

A vote to leave and the passing of the IP Bill could see a ban on the transfer of data between the UK and EU. Opinion by Emily Taylor

2016-03-11

Apple’s Best Defence Against The FBI Is The One It Can’t Admit

Some say the debate over privacy embodied in Apple v FBI conceals the problem that iPhone already has backdoors which Apple hasn’t yet closed.

2016-03-11

UK: Twitter To Train Prosecutors To Fight Online Abuse

The Internet is increasingly used as a weapon by perpetrators of domestic abuse, rape and sexual violence against women.

2016-03-04

UK Government Goes Ahead With Revised Surveillance Bill

Its Back: The Home Office was made to revise the draft bill after concerns by legislators that it was too vague and did not protect privacy enough.

2016-03-02

Giant Financial Hacking Prosecution Expands

Five Russian citizens plus four companies being pursued over a computer hacking scam that generated $100 million of illicit profits from insider trading.

2016-02-23

Why Aren’t Cyber Criminals Being Brought to Justice?

Cyber criminals are making off with $400 to $500 billion each year; why exactly are attackers getting away without being brought to justice?

2016-02-12

Snowden Leaks Spill Over Into The Courts

There is growing legal debate in the U.S. over the potentially invasive nature of big data cyber-surveillance tools.

2016-02-12

EU Protects Online Data Quite Differently From The US

What control do you have over how companies collect & use your information? Different approaches in the US & EU have consequences.

2016-02-09

There Are No Laws About Using Killer Robots

Tech experts including Stephen Hawking have warned us about the dangers of AI robots and there are no laws about using them.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Asavie

Asavie

Asavie provide solutions for Enterprise Mobility Management and secure IoT Connectivity.

MarQuest

MarQuest

MarQuest provides services and systems to enhance network reliability and security.

Israel National Cyber Directorate (INCD)

Israel National Cyber Directorate (INCD)

The Israel National Cyber Directorate is the national security and technological agency responsible for defending Israel’s national cyberspace and for establishing and advancing Israel’s cyber power.

Trusted Knight

Trusted Knight

Trusted Knight is a leading provider of security software solutions focused on defeating newly developed malware and crimeware trojans.

Applied Risk

Applied Risk

Applied Risk is an established leader in Industrial Control Systems security, focused on critical infrastructure security and combating security breaches that pose a significant threat.

Indusface

Indusface

Indusface offers best website security, web application firewall and SSL certificate to keep your online business much safer.

VS Security Products

VS Security Products

VS Security Products design, manufacture and sell the most extensive range of degaussers and data destroyers on the market, suitable for all types of magnetic media.

Eclypsium

Eclypsium

Eclypsium protects organizations from the foundation of their computing infrastructure upward, controlling the risk and stopping threats inside firmware of laptops, servers, and networks.

Q-Net Security

Q-Net Security

Protect your critical networks. Q-Net Security make hardware that provides the strongest drop-in security for your existing critical infrastructure.

AiCULUS

AiCULUS

AiCULUS is a global technology company that specializes in API security and Risk Management products.

Falcongaze

Falcongaze

Falcongaze SecureTower is a comprehensive DLP solution for the protection of business against internal threats.

Pacific Global Security Group

Pacific Global Security Group

Pacific Global Security Group offers an intelligence-driven focus on all aspects of cybersecurity for IT/ICS/OT.

Polestar Industrial IT

Polestar Industrial IT

Polestar work on both sides of the IT & OT divide. Network, Data & Asset Security is our priority. Polestar installations are robust and resilient and comply with the appropriate security.

Entro Security

Entro Security

Entro is the first holistic secrets security platform that detects, safeguards, and enriches with context your secrets across code, vaults, chats, and platforms.

CYBHORUS

CYBHORUS

CYBHORUS are a team of Italian cyber security experts, specialized in cyber threat defense and strategic and organizational consulting.

BluTinuity

BluTinuity

BluTinuity is a premier management consulting firm with a passion for information security, business continuity, incident response, disaster recovery, and HIPAA security.