BUSINESS > Services > Law


« Back to News

2018-04-23

A New Distributed Database Adds GDPR Controls

The company with a terrible name introduces a useful new cloud data product to facilitate automated multi-territory compliance with GDPR.

2018-04-19

Offensive Cyberattacks Must Balance Lawful Deterrence & The Risks Of Escalation

A government contemplating the use of offensive cyber operations will need to consider the precedents – or the lack of them.

2018-04-24

Six Myths About GDPR

Despite months of publicity about GDPR, including the potential benefits of compliance, very few organisations are ready for the May 25 mandate.

2018-04-30

Six Steps to Protect Customer Data

Data abuse and mishandling can have grave consequences. The Internet Society has six recommendations to promote trust among users.

2018-04-07

GDPR Countdown

When did your company become aware of the General Data Protection Regulation and the need to do something about it?

2018-04-18

Regulation Might Actually Protect Facebook

Regulation might actually protect Facebook from competitors. Breakup, not regulation, is the threat that Mark Zuckerberg really fears.

2018-04-18

What Does GDPR Mean For the Retail Industry?

Retailers collect masses of personal data from customers/client emails and payment details. All shortly to be subject to GDPR. By Alfred Rolington

2018-04-16

Australia’s Cybersecurity Adviser Calls For Privacy

Australia's national cybersecurity adviser has urged social media companies to improve the way they treat personal data.

2018-04-11

Cambridge Analytica, Facebook & GDPR

The UK Information Commissioner has her work cut out deciding if there has been any illegality in her jurisdiction. Would it be different after GDPR?

2018-04-06

Using GDPR Compliance To Excel At CRM

GDPR offers an unprecedented opportunity for businesses to provide better data security and privacy services to their customers.

2018-04-03

Data Protection Officer's Guide To The GDPR Galaxy

Is the imminent GDPR deadline got you freaking out? These five tips might help you calm down, at least a little bit.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ISACA Conferences

ISACA Conferences

ISACA is dedicated to offering the most dynamic and inclusive conferences to keep you abreast of the latest advances in IT and Information Security.

Red Balloon Security (RBS)

Red Balloon Security (RBS)

Red Balloon Security is a leading embedded device security company, delivering deep host-based defense for all devices.

Quaynote Communications

Quaynote Communications

Quaynote Communications is a specialist conference and communications company focused primarily on the maritime, yachting, aviation and security industries.

Qatar Computing Research Institute (QCRI)

Qatar Computing Research Institute (QCRI)

QCRI perform cutting-edge research in such areas as Arabic language technologies, social computing, data analytics, distributed systems, cyber security and computational science and engineering.

Arsenal Recon

Arsenal Recon

Arsenal Recon are digital forensics experts, providing consultancy services and powerful software tools to improve the analysis of electronic evidence.

NESECO

NESECO

NESECO is an IT security integration and consulting firm providing security products, solutions, support, consulting, and training services.

CultureAI

CultureAI

CultureAI deliver intelligent cyber security awareness education and tools that build resilient security cultures where employees help defend.

Soliton

Soliton

Soliton is a leading Japanese technology company and a pioneer in IT security solutions for protecting company resources and data from external IT security threats.

Melius Cyber Security

Melius Cyber Security

Melius Cyber Security has developed a world-leading SaaS platform, Cyber Safe Plus, built around continuous assessment and improvement through vulnerability scanning and penetration testing

Digital Pathways

Digital Pathways

Digital Pathways is an award-winning data security provider that helps businesses protect their digital assets.

ReasonLabs

ReasonLabs

ReasonLabs have created a next-generation anti-virus that is enterprise grade, yet accessible to any personal device around the world.

eCloudvalley Digital Technology

eCloudvalley Digital Technology

eCloudvalley Digital Technology is a born-in-the-cloud partner focused entirely on AWS services across APAC region.

Performance Technologies

Performance Technologies

As a leading IT Solutions Provider in Greece, Performance Technologies delivers reliable, long life solutions, ensuring continuous availability of business-critical services and information.

PROVINTELL Cyber Security

PROVINTELL Cyber Security

PROVINTELL is a Managed Security Service Provider (MSSP) specialising in Next-Gen Cyber Defense and Response to detect and respond to threats.

Reality Defender

Reality Defender

Reality Defender stops deepfakes before they become a problem. Our proprietary deepfake and generative content fingerprinting technology detects video, audio, and image deepfakes.

Sonar

Sonar

AI generated or written by humans, Sonar’s Clean Code Solutions cover your code quality needs, improving code reliability, maintainability, and security.