BUSINESS > Services > Law


« Back to News

2015-07-02

Court Briefly Returns NSA Surveillance Program

Has The USA Freedom Act really put an end to NSA's domestic bulk metadata collection? It seems not..

2015-06-29

China Security Bill Calls for ‘Cyber Sovereignty’

The bill calls for “cultural security” & improving socialist education to prevent the “infiltration of unhealthy culture.”

2015-06-27

Data Security and Loss of Control Killing Cloud?

Opinion By Frank Jennings Cloud & Commercial Lawyer at Wallace LLP

2015-06-24

A Quick Tour in the Web Black Market

The most important requirement for both buyers and sellers is the anonymity of the transaction using untraced networks & virtual currency.

2015-06-19

What’s in the New UK Surveillance Bill?

The government intend wholesale reform but will it perpetuate invasion of privacy or put an end mass surveillance?

2015-06-16

Russia Hacked The German Parliament

The German government says the hack of the Bundestag came from Russia in a state-sponsored attack.

2015-06-09

UK Secret Report Urges US Data Sharing

Top secret report to the UK Prime Minister recommends a new international treaty to enforce cooperation of the US Internet giants.

2015-06-11

FBI, Europol and NCA Want Global Approach to Fighting Cyber-Crime

Law enforcement experts discuss cyber-crime policing during the ‘Know your adversary: Who is the cyber-criminal?' keynote at InfoSec Europe.

2015-06-08

Rethinking Cybersecurity in the Age of the Hacker

If even the best-resourced companies are losing the cyber-security battle, what hope is there for the rest of us?

2015-06-08

US Calls for Cyber Reform After Massive Hack

The White House urges Congress to come out of the "dark ages" and pass new cyber security rules.

2015-06-01

Finland Could Reshape Cyber Law

The world needs a fluid and frank dialogue among states, the private sector & civil society to guarantee the security of cyberspace.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

InfoSec People

InfoSec People

InfoSec People is a boutique cyber and technology recruitment consultancy, built by genuine experts.

rPeople Staffing

rPeople Staffing

rPeople provides direct placement in all areas of your organization, including and specializing in Technical and Executive hiring.

SC Media

SC Media

SC Media arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face.

TitanFile

TitanFile

TitanFile is an award-winning, easy and secure way for professionals to communicate without having to worry about security and privacy.

SecurityScorecard

SecurityScorecard

SecurityScorecard provides the most accurate security ratings & continuous risk monitoring for vendor and third party risk management.

Skurio

Skurio

Skurio create cost-effective, intuitive and powerful Cloud based solutions to identify threats, detect data breaches outside the network and automate the response.

National Cybersecurity Institute (NCI) - Excelsior College

National Cybersecurity Institute (NCI) - Excelsior College

NCI is Excelsior College’s research center dedicated to assisting government, industry, military and academic sectors meet the challenges in cybersecurity policy, technology and education.

Secure Soft

Secure Soft

Secure Soft are experts in Computer and Information Security with a presence in Peru, Colombia and Ecuador.

Deceptive Bytes

Deceptive Bytes

Deceptive Bytes provides an Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome.

NINJIO

NINJIO

NINJIO is a leader in cybersecurity awareness training. View IT Security Awareness through a different lens - entertain and educate your users through storytelling.

Seadot Cybersecurity

Seadot Cybersecurity

Seadot offer cybersecurity services to organizations with a high demand for regulatory compliance and security.

Nerds On Site

Nerds On Site

Nerds On Site provide on-site & in-home IT and technical support, managed IT services, and cyber security through our collaborative team of highly-trained IT and Security professionals.

Tech Data

Tech Data

Tech Data, a TD Synnex company, is a leading global distributor and solutions aggregator for the IT ecosystem.

Swick Technologies (SWICKtech)

Swick Technologies (SWICKtech)

SWICKtech offer IT managed services to increase IT security, stability, and performance for your organization.

RESTIV Technology

RESTIV Technology

RESTIV Compliance Copilot is your partner in continuous compliance. Real-time monitoring, continuous testing, and transparent evidence—no surprises, just peace of mind.

National Protective Security Authority (NPSA) - UK

National Protective Security Authority (NPSA) - UK

NPSA is part of MI5 and is the National Technical Authority for physical and personnel protective security. By making the UK more resilient to national security threats, we help to make the UK safe.