BUSINESS > Services > Law


« Back to News

2021-08-11

Apple Uses Surveillance To Detect Child Abuse

The next generation of iOS will be set up to automatically scan connected devices to identify if they contain media featuring child sexual abuse.

2021-07-14

Over 40% Of UK Organisations Reported To ICO Since GDPR

A survey suggests a lack of cyber resilience, with IT leaders having difficulty locating & securing data and in understanding their GDPR data obligations.

2021-07-08

EU Says That UK Data Protection Rules Are ‘Adequate’

The EU says that UK data protection standards are “adequate” until 2025, but the UK is working on its own data transfer regime to replace GDPR.

2021-07-05

Data Dominance: EU Investigates Google

The investigation will examine Google's role in collecting data, selling advertising space and acting as an online-advertising intermediary.

2021-06-21

US Legislators Take Aim At Big Tech Companies

Antitrust Reform: US lawmakers have introduced five separate bills aimed at limiting the power held by the five 'Big Tech' companies.

2021-05-17

British Law To Protect Online Users

Social media firms will have to remove harmful content quickly or potentially face multi-billion-pound fines under new British legislation.

2021-05-17

The European Union's Digital Security Plan

A Single European Data Market: The European Union has a well-developed plan to become the leader in the next wave of digital transformation.

2021-05-07

Apple Hammered By EU

Apple is charged with breaking EU competition rules over the way it runs its App Store, but they are making plenty of money to pay the fine.

2021-04-28

Better Cyber Security For Smart Devices

Secure by Design: The British government is working to ensure consumer "smart" devices are more secure, with security built in from the start.

2021-03-30

Investigating Fake News With Google, YouTube & Facebook

The big three Social Media chiefs grilled by US politicians over the proliferation of disinformation on the YouTube, Twitter and Facebook platforms.

2021-03-30

Facebook's Internal Content Rules Revealed

Facebook users are allowed to call for the death of public figures and can praise mass murders based on vague definitions of what constitutes a crime.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Mako Group

Mako Group

The Mako Group specializes in protection - providing security through auditing, testing, and assessments. And, we do it all with the highest quality standards possible.

Japan Information Security Audit Association (JASA)

Japan Information Security Audit Association (JASA)

JASA is non-profit association active in developing and managing the quality of Information Security Auditing and Auditors in Japan.

Galois

Galois

Galois specializes in the research and development of new technologies that solve the most difficult problems in computer science.

Netresec

Netresec

Netresec is an independent software vendor with focus on the network security field. We specialize in software for network forensics and analysis of network traffic.

Vector InfoTech

Vector InfoTech

Vector InfoTech is a leader in Industrial Security, Networks, IT and Telecommunications.

limes datentechnik

limes datentechnik

limes datentechnik is an authority in the fields of cryptography and data compression. The FLAM product family is an internationally accepted standard for efficient and safe handling of data.

Sandstone

Sandstone

Sandstone is a strategic intelligence firm providing compliance and integrity investigation, risk advisory assessment, enhanced due diligence, information security advice and litigation support.

TypingDNA

TypingDNA

TypingDNA uses AI to recognise people by the way they type on desktop keyboards and mobile devices.

Neuvoo

Neuvoo

Neuvoo is one of the largest job sites in the world. Our mission is to centralize all jobs available on the web, whether they come from company websites, staffing agencies or job boards.

INFRA Security & Vulnerability Scanner

INFRA Security & Vulnerability Scanner

INFRA is a powerful platform with an easy interface for any kind of Ethical Hacking, from corporate monitoring and VAPT (vulnerability assessments and penetration testing) to military intelligence.

SecureStack

SecureStack

SecureStack helps software developers find security & scalability gaps in their web applications and offers ways to fix those gaps without forcing those developers to become security experts.

AdEPT Technology Group

AdEPT Technology Group

AdEPT are a managed services and telecommunications provider offering award-winning, proven and uncomplicated technical solutions for over 12,000 organisations across the UK.

McCrary Institute - Auburn University

McCrary Institute - Auburn University

The McCrary Institute seeks practical solutions to real-world problems in the areas of cyber and critical infrastructure security.

Sollensys

Sollensys

Sollensys is a leader in commercial blockchain applications. Our flagship product, The Blockchain Archive Server™ is the best defense against the devastating financial loss that ransomware causes.

Triaxiom Security

Triaxiom Security

Triaxiom Security offers penetration testing, security audits, and strategic consulting customized to meet your needs.

AdronH

AdronH

AdronH is a company of Cyber Security consultants. We support companies and public institutions with their digital transformation to new and secure business platforms.