BUSINESS > Services > Law


« Back to News

2019-12-04

The Kids Cyber Protection Code

Children start facing privacy risks as soon as they enter the digital environment, long before their media literacy prepares them to make decisions.

2019-12-02

On Trend: Business Data Protection Laws

Eighty countries worldwide have now adopted strict data protection laws to prohibit misuse of private information. Business must react.

2019-11-26

GDPR Data Regulations & Commercial Fines

GDPR allows EU citizens to see what data is held on them by an organisation and how it is being used. But not all infringements lead to fines.

2019-11-25

Regulatory Plans For Artificial Intelligence & Algorithms

Two pieces of legislation are under consideration by the US Congress, one regulating the use of Algorithms and the other the development of AI.

2019-11-15

Google Challenged For Collecting American Health Data

Google and a US healthcare company have been secretly working together on a project to store and analyse millions of patient medical records.

2019-11-04

Russia Will Try Leaving The Global Internet

Cyber Sovereignty or Virtual Iron Curtain? Russia will test its internal RuNet network to see if the country can function outside the global Internet.

2019-11-01

GDPR Lessons Learned

Uncertainty and contradictions have defined the first year of General Data Protection Regulation (GDPR) enforcement. By Simon Fogg

2019-10-22

Cybersecurity And The EU's Regime For 5G Networks

The powerful new features of 5G networking will bring numerous security challenges. A lot will depend on regulatory compliance. By Joao Paro

2019-10-07

A Cyber Compliance Economy

As the IoT expands, companies are growing more concerned with the question of corporate liability in case of cyber attacks. By Joao Paro.

2019-09-16

EU Crackdown On Cyber Crime

A new European regime will provide potentially powerful sanctions against cyber-criminals, both people & the organisations associated with them.

2019-09-11

The GDPR Wake-Up Call Is Being Ignored By Business

Only half of UK businesses have a security strategy in place and just a quarter are prioritising security when it comes to technology investment.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

IP Performance

IP Performance

IP Performance Limited is a leading supplier of customised network infrastructure and security solutions.

Technology Association of Georgia (TAG)

Technology Association of Georgia (TAG)

TAG's mission is to educate, promote, influence and unite Georgia's technology community to stimulate and enhance Georgia's tech-based economy.

Global Information Assurance Certification (GIAC)

Global Information Assurance Certification (GIAC)

GIAC provides certification in the knowledge and skills necessary for a practitioner in key areas of computer, information and software security.

Exostar

Exostar

Exostar is the cloud platform of choice for secure enterprise and supply chain collaboration solutions and identity and access management expertise.

Qatar Computing Research Institute (QCRI)

Qatar Computing Research Institute (QCRI)

QCRI perform cutting-edge research in such areas as Arabic language technologies, social computing, data analytics, distributed systems, cyber security and computational science and engineering.

CyberWarrior

CyberWarrior

CyberWarrior deliver training and consulting for some of the world’s top brands and also partner with national systems integrators to augment their teams with our expertise.

Eseye

Eseye

Eseye is a global specialist supplier of cellular internet connectivity for intelligent IoT (Internet of Things) devices.

Belden

Belden

Belden is a global leader in signal transmission and security solutions for mission-critical applications in enterprise and industrial markets. Belden brands include Hirschmann and Tofino Security.

CyBOK - University of Bristol

CyBOK - University of Bristol

CyBOK is a comprehensive Body of Knowledge to inform and underpin education and professional training for the cyber security sector.

Digital Magics

Digital Magics

Digital Magics is an incubator for innovative startups which offer content and services with high technological value. Areas of focus include IoT, Enterprise Software, AI, Industry 4.0 and Blockchain.

AMSYS Innovative Solutions

AMSYS Innovative Solutions

AMSYS is a full-service, 24/7/365 IT solutions, Cybersecurity & Managed Service Provider.

GM Sectec

GM Sectec

GM Sectec is the world's largest independent Cyber Defense and Fraud Prevention firm laser focused on payment security.

ThreatLocker

ThreatLocker

The ThreatLocker Platform provides a Zero Trust security solution that offers a unified approach to protecting users, devices, and networks against the exploitation of zero day vulnerabilities.

Deloitte

Deloitte

Deloitte is a multinational professional services firm providing audit, consulting, financial advisory, risk management, tax, and related services to clients.

BARR Advisory

BARR Advisory

At BARR Advisory, we build trust through cyber resilience. We help protect the world’s data, people, and information networks through a human-first approach to cybersecurity and compliance.

Neo Auth

Neo Auth

Neo Auth is an identity and access management solution to help organizations optimize their cybersecurity processes.