BUSINESS > Services > Law


« Back to News

2025-02-10

Apple Ordered To Give Access To Users' Encrypted Data

Investigatory Powers: British law enforcement have demanded access to encrypted data stored by Apple users in its global cloud service.

2025-02-10

New Laws To Prevent Using AI To Generate Sexual Images

Punishable By Five Years in Prison: Britain is to introduce new laws to tackle the misuse of AI tools behind the creation of abusive child imagery.

2025-01-21

A New Era Of Digital Resilience For The EU

DORA Takes Effect: As cyber threats grow in complexity and with a growing reliance on digital infrastructure, DORA is a vital step. By Jamie Moles

2025-01-11

British Online Safety Act Takes Effect

Online platforms have three months to assess the risk of their users encountering illegal content and implement safety measures or face prosecution.

2025-01-06

Apple Will Pay $95m Penalty For Misusing Siri

Apple will have pay $95m to settle a case which claimed that its Siri virtual assistant was listening in to Apple users without their permission.

2024-12-09

TikTok Will Be Banned In The USA

Censorship & The Rule Of Law: A Federal Court has upheld the law which requires TikTok to sell or close it US operation by early 2025.

2024-11-22

Google Faces Order To Divest Chrome

Legal Remedy: A US court ruling that Chrome operates a monopoly in Inernet search may soon result in Google being ordered to sell the business.

2024-11-20

Ireland Orders X, TikTok & Instagram To Cut Terrorist Content

The Irish media commission gave the social media platforms 12 weeks to make “effective, targeted & proportionate” measures to stop terrorist content.

2024-10-30

How Do The UK Cyber Security & Resilience Bill & The EU's NIS2 Compare?

Business operating in both regimes can expect to have to meet both UK & EU regulations and so will need to seek harmonization. by Innes Muir

2024-10-25

What Security Teams Need To Know About The EU’s NIS 2 Directive

Act Now: The NIS 2 Directive brings significant changes and increased obligations for organizations across the EU & beyond. By Graham Rance

2024-10-01

Six Steps On The Road To NIS2 Compliance

NIS2 is the EU’s stringent new cybersecurity Directive and member states have until 17th October to ratify it into national law. By Martin Davies

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Homeland Security Advanced Research Projects Agency (HSARPA)

Homeland Security Advanced Research Projects Agency (HSARPA)

HSARPA's Cyber Security Division (CSD) was set up to address DHS cyber operational and critical infrastructure protection requirements.

Illumio

Illumio

Illumio delivers adaptive security for every computing environment, protecting the 80% of data center and cloud traffic missed by the perimeter.

Ovarro

Ovarro

Ovarro is the new name for Servelec Technologies and Primayer. Ovarro's technology is used throughout the world to monitor, control and manage critical and national infrastructure.

Coursera

Coursera

Coursera provides universal access to the world’s best education, partnering with top universities and organizations to offer courses online. Subject areas include Computer Security & Networks.

Information Systems Security Partners (ISSP)

Information Systems Security Partners (ISSP)

ISSP is a specialized system integrator focused on the information security needs of its corporate clients and providing best in class products and services for securing organizational information.

WISeKey

WISeKey

WISeKey is a leading cybersecurity company currently deploying large scale digital identity ecosystems for people and objects using Blockchain, AI and IoT.

Recruit.net

Recruit.net

Recruit.net allows job seekers to instantly find millions of jobs from thousands of web sites with a single search.

McIntyre Associates

McIntyre Associates

McIntyre Associates is an Executive Search boutique specialized in recruiting for the Cybersecurity industry. Our clients range from Venture Capital backed startups to Fortune 100 companies.

DNX Ventures

DNX Ventures

Based in Silicon Valley and Tokyo, DNX Ventures is an early stage VC for B2B startups in sectors including Cybersecurity.

Prancer

Prancer

Prancer is the industry's first cloud-native, self-service SAAS platform for automated security validation and penetration testing in the cloud.

Primary Guard

Primary Guard

Primary Guard provides IT solutions and computing technologies that help minimize impact from cyber threats, improve business efficiency and maintain essential functions during or after a disaster.

Approov

Approov

Approov provides a comprehensive runtime security solution for mobile apps and their APIs, unified across iOS and Android.

Bleach Cyber

Bleach Cyber

Bleach Cyber helps small businesses with an affordable and user-friendly solution for managing cloud security.

Securin

Securin

Securin offers a comprehensive portfolio of solutions including Attack Surface Management, Vulnerability Intelligence, Penetration Testing, and Vulnerability Management.

Smarsh

Smarsh

Smarsh products are designed for user-friendly, efficient compliance. From archiving, supervision, and discovery to cybersecurity – Smarsh has you covered.

MIND

MIND

MIND is the first-ever data security platform that puts data loss prevention and insider risk management programs on autopilot, so you can automatically identify, detect and prevent data leaks.