BUSINESS > Services > Law


« Back to News

2020-08-10

The Effects Of GDPR On EU / US Relations

The attempt by GDPR to extend EU privacy rights to every country receiving EU personal data suggests that privacy standards will be globalised.

2020-08-03

European Union Sanctions Cyber Attackers

The EU imposes sanctions on targeted individuals and entities from Russia, China and North Korea in a sign that it is taking cyber warfare seriously.

2020-06-29

Julian Assange Faces New Criminal Charges

The indictment includes an accusation that the WikiLeaks founder conspired with LulzSec hackers to steal classified files from secret US databases.

2020-06-15

Facebook Criticised For Workplace Suppression Controls

Facebook's Workplace is an office collaboration product with powerful tools for employers to monitor and control discussions in the workplace.

2020-06-15

Journalist Convicted of Cyber Libel

A charge of 'Cyber Libel' has been used by the Philippine Government to convict a journalist under legislation designed to control pornography.

2020-06-12

Google Faces Lawsuit For Tracking Users In Privacy Mode

Google gathers data through Google Analytics, Ad Manager, smartphone apps and other applications, even after users think they have gone private.

2020-06-05

What Can Hold Up Your International Project?

The term “export controls” is enough to send most people to sleep, but in the cybersecurity world it can have often unforeseen consequences.

2020-06-02

Customer Compensation Claim Follows The EasyJet Hack

EasyJet faces a liability of £18 billion from a class action claim filed in London on behalf of the airline's customers hit by a data breach.

2020-04-08

The Risks Of Remote Working

Enforced remote working during the Covid-19 lockdown leaves users especially vulnerable and now top APT- level hackers are getting involved.

2020-04-20

Singapore Introduces Home Cyber Security Labelling

Singapore is one of the first countries to require labels on Wi-Fi routers, home hubs and other IoT devices to strengthen domestic cyber security.

2020-03-28

New Guidelines For Maritime Cyber Security

Cyber attacks on maritime freight may result in severe operational failures and new guidelines aim to contain threats from phishing emails & malware.

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Perimeter 81 / Zero Trust Network Access Guide

Perimeter 81 / Zero Trust Network Access Guide

Curious how you can Implement a Zero Trust roadmap with insights from Gartner? Download this free report for a limited time only.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Montash

Montash

Montash is an award winning, global technology recruitment business, specialising in the acquisitions of high-performing talent across a number of core disciplines including Information Security.

Social-Engineer Inc

Social-Engineer Inc

Social-Engineer is a consulting and training company specializing in the science of social engineering in the context of digital security.

Cyber adAPT

Cyber adAPT

Cyber adAPT offers a leading network threat detection platform (NTD) to the enterprise and ODM/OEM markets.

CENTRI Technology

CENTRI Technology

CENTRI provide a standards-based security platform for the Internet of Things.

Cyber Craft

Cyber Craft

CyberCraft is an innovative and dynamic software development, outsourcing and consulting company. Services offered include penetration testing.

Sera-Brynn

Sera-Brynn

Sera-Brynn is one of the highest-ranked, pure-play cybersecurity compliance and advisory firms in the world.

ShiftLeft

ShiftLeft

ShiftLeft is a continuous application security platform, purpose-built for the modern software development life cycle.

Secure Code Warrior

Secure Code Warrior

Secure your code from the start with gamified, scalable online secure coding training for software developers.

Marcus Donald People

Marcus Donald People

Marcus Donald People is a UK IT recruitment specialist covering the following sectors: Infrastructure & Cloud, Information Security, Development, Business transformation.

Sevonix

Sevonix

Sevonix is a professional services organization specializing in offering best in class technology implementation and information security consulting services.

Build Sec Foundry

Build Sec Foundry

Build Sec Foundry is a long-term incubator helping founders launch information security product startups in Central Texas.

Aujus Cybersecurity

Aujus Cybersecurity

Aujas is a pure-play cyber security services company with deep expertise in Identity and Access Management, Managed Security and Security Testing services.

Kiuwan

Kiuwan

Kiuwan provide software security solutions with SAST and SCA source-code analysis that fit into your DevOps process.

Cipher

Cipher

Founded in 2000, Cipher is a global cybersecurity company that delivers a wide range of Managed Security Services.

CrowdSec

CrowdSec

CrowdSec is an open-source & participative IPS able to analyze visitor behavior by parsing logs & provide an adapted response to all kinds of attacks.

Microminder Cyber Security

Microminder Cyber Security

Microminder Cyber Security are innovators, advisors, strategists committed to solving your cyber security challenges.