BUSINESS > Services > Law


« Back to News

2019-07-11

US Electoral Infrastructure Is Wide Open To Hackers

Most US electronic voting systems are nothing but bare-bone, decade old computer systems that lack even rudimentary endpoint security.

2019-07-09

Improving Electric Power-Grid Security

Going Backwards To Go Forwards: US legislators want to mandate 'retro' analogue control systems in US Power stations to improve cyber-resilience.

2019-06-25

Clayden Law: GPPR Is 1-Year Old

An Guide To GDPR From Clayden Law: Experts in Information Technology, Data Privacy & Cyber Security.

2019-07-03

GDPR Is Now 1-Year Old

Clayden Law's Guide to GDPR: One year after its introduction, now is a very good time for organisations to review their GDPR compliance.

2019-07-02

Tackling The ‘Splinternet’

Rapid advances in technical capabilities and the associated rise in security threats have overtaken effective regulation in the digital economy.

2019-06-20

TalkTalk Hacker Jailed

Daniel Kelley became a "Black Hat" hacker when he failed to get the GCSE grades to get on to a computer course. Now he's been jailed for 4 years.

2019-06-19

Now Is Definitely Time To Check You Are GDPR Compliant

As the risk of a punitive fine grows, it is vital to verify that your organisation is GDPR compliant. There are four key areas to consider.

2019-06-03

Mueller Reports On Russian Interference

Moscow's interference in the 2016 election was unequivocal & emphatic & used "sophisticated cyber techniques", hacking networks and email.

2019-06-13

Wanted: An International Cyber Security Law

The global Domain Name System (DNS) is a central part of the internet and it needs to have legal protection by international treaty.

2019-05-23

GDPR Is One Year Old This Week

Over 59,000 data breach notifications have been reported across the European Economic Area and The Netherlands, Germany and UK top the list.

2019-05-15

Britain To Initiate Online “Porn Ban’

The UK government intends to implement a “Porn Ban” nationwide on July 15, restricting access to online pornography for under 18s. But will it work?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ITQ

ITQ

ITQ is an IT consulting firm with a focus on the entire VMware-product portfolio with three main services: Professional Services, Support Services and Managed Services.

Herjavec Group

Herjavec Group

Herjavec Group's Managed Security Services practice defends your organization from increasingly sophisticated, targeted cybercrime threats.

My Data Recovery Lab

My Data Recovery Lab

We recover data from: HDDs, RAIDs, NAS, SSDs, USB Flash Devices, Desktop Computers, Mobile devices and other data storage media.

Secmentis

Secmentis

Secmentis is a cyber security consultancy specializing in penetration testing, threat intelligence, and proactive defense for your IT infrastructure.

Roke Manor Research

Roke Manor Research

Roke is a world-class electronics engineering consultancy. Areas of expertise include cyber security, cyber assurance and cryptographic solutions.

Smokescreen

Smokescreen

Smokescreen's IllusionBLACK employs deception technology to detect, deflect and defeat advanced hacker attacks.

Nakivo

Nakivo

NAKIVO is dedicated to delivering the ultimate backup, ransomware protection and disaster recovery solution for virtual, physical, cloud and SaaS environments.

Sixgill

Sixgill

Sixgill, an IoT sensor platform company, builds the universal data service and smart process automation software allowing any organization to effectively govern its IoE assets.

Titans24

Titans24

Titans24 is a Software-as-a-Service security platform for web applications. It prevents attacks on business websites that are protected under 11 cyber-security layers.

Concentric

Concentric

Concentric Data Risk Monitoring and Protection. Deep Learning to discover, monitor and remediate risks to sensitive data on-premises and in the cloud.

Xmirror Security

Xmirror Security

Xmirror Security focuses on integrated detection and defense of the continuous threat to the DevSecops software supply-chain with artificial intelligence technology as the core.

Grindstone Ventures

Grindstone Ventures

Grindstone Ventures is a post-seed fund that supports post-seed equity and quasi-equity investments in early-stage innovation-driven and/or technology companies.

Valeo Nertworks

Valeo Nertworks

Valeo Nertworks is a full-service Managed Security Service Provider (MSSP). We partner with organizations to remove the burden of technology so that they can focus on growing their business.

IGI Cybersecurity

IGI Cybersecurity

IGI Cybersecurity delivers people-driven cybersecurity for personalized, resilient cyber defense focused on individualized strategy and unshakeable partnership.

Nihka Technology Group

Nihka Technology Group

Nihka offers full end-to-end ICT solutions from business optimisation, data centre modernisation, cloud connection and management, and ICT security.

TraitWare

TraitWare

The TraitWare mission is to increase user and company security while simplifying access to digital and physical resources through the elimination of the need for usernames and passwords.