BUSINESS > Services > Law


« Back to News

2025-02-10

Apple Ordered To Give Access To Users' Encrypted Data

Investigatory Powers: British law enforcement have demanded access to encrypted data stored by Apple users in its global cloud service.

2025-02-10

New Laws To Prevent Using AI To Generate Sexual Images

Punishable By Five Years in Prison: Britain is to introduce new laws to tackle the misuse of AI tools behind the creation of abusive child imagery.

2025-01-21

A New Era Of Digital Resilience For The EU

DORA Takes Effect: As cyber threats grow in complexity and with a growing reliance on digital infrastructure, DORA is a vital step. By Jamie Moles

2025-01-11

British Online Safety Act Takes Effect

Online platforms have three months to assess the risk of their users encountering illegal content and implement safety measures or face prosecution.

2025-01-06

Apple Will Pay $95m Penalty For Misusing Siri

Apple will have pay $95m to settle a case which claimed that its Siri virtual assistant was listening in to Apple users without their permission.

2024-12-09

TikTok Will Be Banned In The USA

Censorship & The Rule Of Law: A Federal Court has upheld the law which requires TikTok to sell or close it US operation by early 2025.

2024-11-22

Google Faces Order To Divest Chrome

Legal Remedy: A US court ruling that Chrome operates a monopoly in Inernet search may soon result in Google being ordered to sell the business.

2024-11-20

Ireland Orders X, TikTok & Instagram To Cut Terrorist Content

The Irish media commission gave the social media platforms 12 weeks to make “effective, targeted & proportionate” measures to stop terrorist content.

2024-10-30

How Do The UK Cyber Security & Resilience Bill & The EU's NIS2 Compare?

Business operating in both regimes can expect to have to meet both UK & EU regulations and so will need to seek harmonization. by Innes Muir

2024-10-25

What Security Teams Need To Know About The EU’s NIS 2 Directive

Act Now: The NIS 2 Directive brings significant changes and increased obligations for organizations across the EU & beyond. By Graham Rance

2024-10-01

Six Steps On The Road To NIS2 Compliance

NIS2 is the EU’s stringent new cybersecurity Directive and member states have until 17th October to ratify it into national law. By Martin Davies

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Actiphy

Actiphy

Actiphy provides a tried and proven backup and disaster recovery software solution to ensure business continuity at all times.

Thales

Thales

Thales provides solutions, services and products that help its customers in the defence, aeronautics, space, transportation and digital identity and security markets to fulfil their critical missions.

RevenueStream

RevenueStream

RevenueStream uses an innovative algorithmic approach to intercept and prevent payment fraud before it even happens.

Irdeto

Irdeto

Irdeto is the world leader in digital platform security, protecting platforms and applications for media & entertainment, gaming, connected transport and IoT connected industries.

Matrix42

Matrix42

Matrix42 software for digital workspace experience manages devices, applications, processes and services simple, secure and compliant.

Sanderson Recruitment

Sanderson Recruitment

Sanderson is a recruitment company providing expert recruitment services in areas including Cyber & Information Security.

Veriff

Veriff

Veriff provides highly-automated identity-verification services that prevent fraud like nothing else on the market.

Crosser

Crosser

The Crosser Platform enables real-time processing of streaming or batch data for Industrial IoT, Data Transformation, Analytics, Automation and Integration.

M2SYS

M2SYS

M2SYS is a worldwide leader in identification and authentication solutions.

Level39 (L39)

Level39 (L39)

Level39 is the world's most connected tech community, with over 200 tech startups and scaleups based onsite.

TAC Security (TAC Infosec)

TAC Security (TAC Infosec)

TAC Security (aka TAC Infosec) is a leading and trusted cyber security consulting partner that specializes in securing the IT infrastructure and assets of enterprises.

Space ISAC

Space ISAC

Space ISAC is the only all-threats security information source for the public and private space sector.

Sentor Managed Security Services

Sentor Managed Security Services

Sentor Managed Security Services is a cybersecurity company that enables organizations to exist in a digitally connected world.

AMSYS Innovative Solutions

AMSYS Innovative Solutions

AMSYS is a full-service, 24/7/365 IT solutions, Cybersecurity & Managed Service Provider.

Enterprise Strategy Group

Enterprise Strategy Group

Enterprise Strategy Group, a division of TechTarget, is an IT analyst, research, validation, and strategy firm that provides market intelligence and actionable insight to the global IT community.

Cyber Security Unity (CSU)

Cyber Security Unity (CSU)

Cyber Security Unity (formerly the UK Cyber Security Association) is a new global community which has been set up to help unite the industry and combat the growing cyber threat.