BUSINESS > Services > Law


« Back to News

2020-12-10

Connected Devices Must Be More Secure

The US will establish baseline security standards for IoT manufacturers and require contractors to implement vulnerability disclosure policies.

2020-12-04

Britain's New Regime For Online Platforms

The dominance of only a few tech companies is reducing innovation and having negative effects for the people and businesses that rely on them.

2020-11-30

New British Telecoms Security Law

Britain will take new national security powers to issue directions to public telecoms providers to manage the threat from 'high-risk' vendors.

2020-11-25

Coming Soon: Regulation Of Social Media

If the 'informational chaos' of Social Media is a threat to democracy, then might its regulation by governments be a threat to free speech?

2020-11-16

The Rise and Fall Of America’s Unregulated Internet

Internet regulation is coming, driven by concerns over fake news and industrial monopoly. The only question is how heavy it will be. By Ronald Marks

2020-11-04

Who Do You Trust With Your Personal Data?

People don’t completely trust social media with their personal data, although most Americans trust social media more than they trust the government.

2020-11-02

Cyber Spying Laws Are Changing

Important legal rulings in Britain and the USA show how important it is for business to keep up with and understand national IT & data security laws.

2020-10-29

Amazon Sacks Employee Over Data Violation

Employees of Amazon’s Smart Doorbell product department used their account permissions to access video surveillance data of some customers.

2020-10-28

Ireland's Privacy Regulator Is Investigating Instagram

Facebook could get a huge EU fine after the Irish Data Protection Commission investigation of how Instagram handles childrens' contact data.

2020-10-27

Big Regulatory Changes In Store For The Internet

The US and the EU intend to bring in heavy regulation of tech markets which will have long term consequences for how the internet operates.

2020-10-26

The Big US Tech Corporations Are A ‘Monopoly of Power’

US Legislators are advocating massive changes that would lead to the regulatory disintegration of some of largest US tech companies.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CCN-CERT

CCN-CERT

CCN-CERT is the Spanish national government computer security incident response centre.

CLCERT

CLCERT

CLCERT is dedicated to the monitoring and analysis of the security problems of computer systems in Chile, and the generation of both knowledge and specialized human resources to ensure these systems.

Logically Secure

Logically Secure

Logically Secure provide penetration testing and security assessment services.

Carbon Black

Carbon Black

Carbon Black delivers the industry’s most complete endpoint security platform.

Pindrop Security

Pindrop Security

Pindrop solutions are leading the way to the future of voice by establishing the standard for security, identity, and trust for every voice interaction.

Applied Science and Technology Research Institute Company Limited (ASTRI)

Applied Science and Technology Research Institute Company Limited (ASTRI)

ASTRI's mission is to enhance Hong Kong’s competitiveness in technology-based industries through applied research in areas including Security & Data Sciences which encompasses cybersecurity.

Flipside

Flipside

Information Security training provider specialized in personalized training and security awareness campaigns.

Gradcracker

Gradcracker

Gradcracker is THE careers website for Science, Technology (including Cybersecurity), Engineering and Maths university students in the UK.

Intercast Global

Intercast Global

Intercast's mission is to be a strategic resource to our clients in Risk Reduction. We are a global leader in cyber security staffing and consulting to the enterprise.

Scout Ventures

Scout Ventures

Scout Ventures is an early stage venture capital firm that is making the world a better, safer place by cultivating standout frontier technologies.

Privacyware

Privacyware

Privacyware's ThreatSentry combines a state-of-the-art Web Application Firewall and port-level firewall with advanced behavioral filtering to block unwanted IIS traffic and web application threats.

Drip7

Drip7

Drip7 is a micro-learning platform that is re-inventing the way companies train their employees and build lasting cultural change around the importance of cybersecurity.

Cympire

Cympire

Cympire significantly increases an organisation’s Cyber Resilience through continuous Training and Assessment. Cyber Security Training Platform. Cloud-based and fully customizable Cyber Range.

ArmorCode

ArmorCode

ArmorCode's intelligent application security platform gives us unified visibility into AppSec postures and automates complex DevSecOps workflows.

Alpha Mountain AI (alphaMountain)

Alpha Mountain AI (alphaMountain)

alphaMountain provides up-to-date domain and IP intelligence for cybersecurity investigational and protection platforms.

Rimstorm

Rimstorm

Rimstorm’s mission is to significantly improve the security of your data using award-winning, state-of-the-art technology combined with cyber managed security services.