BUSINESS > Services > Law


« Back to News

2022-04-08

The British Online Harms Bill Takes Shape

There will be new rules for social media and the regulator Ofcom will have powers to fine firms or block access to sites that fail to comply.

2022-03-21

In Britain 'Cyberflashing’ Is Now A Crime

Sending unsolicited sexual images via social media, dating apps, as well as data sharing tools like Bluetooth and Airdrop, will get two years in jail.

2022-03-16

Employees Blame Their Employer For Data Theft

Stolen Personal Data: A sophisticated cyber attack at a Mercedes dealership has prompted the affected staff to sue their employer.

2022-02-21

Facebook To Pay $90m Penalty For Tracking Users

Facebook accused of breaking US laws by using plug-ins to store cookies that tracked users visiting websites containing Facebook “like” buttons.

2022-02-16

Cyber Security Regulations For Smart Devices

Smartphones, TVs, Speakers & Routers: The British government has introduced new legislation to better protect consumers' IoT devices.

2022-02-17

IT Technician Jailed For Revenge Attack After Being Fired

A British IT technician has been jailed for a revenge cyber attack on a school after being sacked for not disclosing a record of criminality.

2022-02-09

Britain Aims To Protect Children From Online Pornography

Pornography websites must carry out age checks & require British users to provide credit card or passport details to prove they are over 18.

2022-02-07

EU Fines For GDPR Breaches Increase Fivefold

EU data regulators issued €1.1 billion in General Data Protection Regulation fines last year, a 585% increase compared to 2020.

2022-02-04

Cyber Criminals Frustrated By Russian Crypto Currency Rules

How To Spend It: New restrictions on using crypto currencies are making life more difficult for Russia's prolific ransomware specialists.

2022-02-02

Google Sued over 'Deceptive' Location Tracking

Dark Patterns: Consumers who use Google products cannot prevent Google from collecting, storing and profiting from their location data.

2022-01-19

Europol Is Told To Delete Its 'Big Data Ark'

The EU data protection regulator has ordered Europol to destroy six years worth of crime reports, hacked phones records & other intelligence.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cyber Security Associates (CSA)

Cyber Security Associates (CSA)

Cyber Security Associates provides cyber consultancy and cyber managed services which help to detect, protect and educate against the ever-changing cyber threat.

Honeynet Project

Honeynet Project

The Honeynet Project is a leading international non-profit security research organization, dedicated to investigating the latest attacks and developing open source security tools.

Checksum Consultancy

Checksum Consultancy

Checksum Consultancy specializes in Information security, Risk management, and IT governance.

AFNOR Group

AFNOR Group

AFNOR Group designs and deploys solutions based on voluntary standards around the world and provides services including training, professional and technical information, assessment and certification.

Infosec Train

Infosec Train

Infosec Train provide professional training, certifications & professional services related to all spheres of Information Technology and Cyber Security.

Predatech

Predatech

A cyber security consultancy offering a range of services, including CREST accredited penetration testing, vulnerability assessments and certifications incl. Cyber Essentials & Cyber Essentials Plus.

StoneLock

StoneLock

StoneLock is a trusted leader in the design and manufacture of facial recognition software and technology.

Pentest Limited

Pentest Limited

Pentest Limited provide information security consultation, penetration testing & red teaming services to companies across the globe.

Assure IT

Assure IT

Assure IT is a Singapore company specialising in technology governance, risk and compliance.

Plante Moran

Plante Moran

Plante Moran is a leading audit, tax, consulting, and wealth management firm. Areas of consulting expertise include cybersecurity.

Zyston

Zyston

Zyston's solutions provide end-to-end management of your cybersecurity needs. Our range of services help protect your business where it needs it the most.

SilverEdge Government Solutions

SilverEdge Government Solutions

SilverEdge is a next generation provider of innovative and proprietary cybersecurity, software, and intelligence solutions for the Defense and Intelligence Communities.

Cisco Systems

Cisco Systems

Cisco helps seize the opportunities of tomorrow by proving that amazing things can happen when you connect the unconnected.

Cyberani Solutions

Cyberani Solutions

Cyberani Solutions was created to fulfill the cybersecurity needs of industry and government in Saudi Arabia, and across the Middle East and North Africa regions.

Washington Technology Solutions (WaTech)

Washington Technology Solutions (WaTech)

WaTech operates the state’s core technology infrastructure – the central network and data center, provides strategic direction for cybersecurity and protects state networks from growing cyber threats.

SecureAck

SecureAck

From our A-Op SaaS automation platform to Managed Automation-as-a-Service (MAaaS), SecureAck offer powerful security automation the way that best suits your organisation's needs.