BUSINESS > Services > Law


« Back to News

2015-06-29

China Security Bill Calls for ‘Cyber Sovereignty’

The bill calls for “cultural security” & improving socialist education to prevent the “infiltration of unhealthy culture.”

2015-06-27

Data Security and Loss of Control Killing Cloud?

Opinion By Frank Jennings Cloud & Commercial Lawyer at Wallace LLP

2015-06-24

A Quick Tour in the Web Black Market

The most important requirement for both buyers and sellers is the anonymity of the transaction using untraced networks & virtual currency.

2015-06-19

What’s in the New UK Surveillance Bill?

The government intend wholesale reform but will it perpetuate invasion of privacy or put an end mass surveillance?

2015-06-16

Russia Hacked The German Parliament

The German government says the hack of the Bundestag came from Russia in a state-sponsored attack.

2015-06-09

UK Secret Report Urges US Data Sharing

Top secret report to the UK Prime Minister recommends a new international treaty to enforce cooperation of the US Internet giants.

2015-06-11

FBI, Europol and NCA Want Global Approach to Fighting Cyber-Crime

Law enforcement experts discuss cyber-crime policing during the ‘Know your adversary: Who is the cyber-criminal?' keynote at InfoSec Europe.

2015-06-08

Rethinking Cybersecurity in the Age of the Hacker

If even the best-resourced companies are losing the cyber-security battle, what hope is there for the rest of us?

2015-06-08

US Calls for Cyber Reform After Massive Hack

The White House urges Congress to come out of the "dark ages" and pass new cyber security rules.

2015-06-01

Finland Could Reshape Cyber Law

The world needs a fluid and frank dialogue among states, the private sector & civil society to guarantee the security of cyberspace.

2015-06-01

Why Use Bitcoin?

Here are 10 good reasons why it’s worth taking the time to get involved in this virtual currency.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Black Hat Briefings

Black Hat Briefings

The Black Hat Briefings are a series of highly technical information security conferences that bring together thought leaders from all facets of the infosec world.

Senetas

Senetas

Senetas is a leading developer and manufacturer of certified high-assurance encryption solutions, dedicated to protecting network transmitted data without compromising performance.

KPN

KPN

KPN is a leading supplier of ICT services including Cyber Security, Identity & Privacy, Secure Communications and Business Continuity.

Brainloop

Brainloop

Brainloop's security architecture enables you to work on and distribute strictly confidential documents both within and beyond the firewall.

Cyber Observer

Cyber Observer

Cyber Observer’s team specializes in providing corporate officers with comprehensive, visual, real-time performance overview, critical security control (CSC) analysis.

WISeKey

WISeKey

WISeKey is a leading cybersecurity company currently deploying large scale digital identity ecosystems for people and objects using Blockchain, AI and IoT.

Edvance

Edvance

Edvance operates a range of cybersecurity businesses including value added cybersecurity solutions distribution, security technology innovation and development, and SaS solution offerings.

Axiomtek

Axiomtek

Axiomtek is a leading design and manufacturing company in the industrial computer and embedded field.

Secure-IC

Secure-IC

Secure-IC provide end-to-end, best-of-breed security expertise, solutions, and hardware & software technologies, for embedded systems and connected objects.

Adarma Security

Adarma Security

Adarma are specialists in threat management including SOC design, build & operation.

Elisity

Elisity

Elisity Cognitive Trust is a new security paradigm that combines Zero Trust Network Access and an AI-enabled Software Defined Perimeter.

Bastion Networks

Bastion Networks

Bastion are a security-focussed managed solution provider and consultancy. We work with advanced cyber security vendors to produce managed security solutions to protect from online threats.

Segra

Segra

Segra owns and operates one of the nation’s largest fiber networks and provides best-in-class broadband and data security solutions throughout the Southeast and Mid-Atlantic.

OpenAI

OpenAI

OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity.

Heyhack

Heyhack

Heyhack is a SOC 2 Type II certified automated penetration testing platform for web apps and APIs.

Kahootz

Kahootz

Kahootz is a highly secure cloud collaboration platform helping teams to work together across organisations.