BUSINESS > Services > Law


« Back to News

2023-01-03

Meta Pays $725M To Settle Facebook Privacy Suit

Facebook’s parent company Meta has agreed to settle a US lawsuit following 2018 revelations that Facebook illegally shared data of 87m users.

2022-12-29

France Fines Microsoft For Privacy Breaches

Fined $64 Million: Microsoft's search engine Bing was operating with a system that did not allow users to easily get out of cookie collection.

2022-12-16

Britain's Cyber Security Laws Get Updated

IT services suppliers will be compelled to have effective cyber security measures in place to protect client data, with fines for non-compliance.

2022-12-07

Top Cybersecurity Advice For In-House Counsel

Cybersecurity is a key consideration for any company and has been highlighted as one of the top three issues for chief legal officers. By Robert Kang

2022-11-30

Sharing Deepfakes To Be Made Illegal In Britain

The proposed new law will allow prosecution for recording and sharing intimate images without the need to prove an intention to cause distress.

2022-11-29

It’s Well Past 230 For The US Communications Decency Act

US Legislation introduced 26 years ago that was designed to protect & promote growth of the Internet is well past its 'Sell By' date. By Ronald Marks.

2022-11-23

Facial Recognition Technology Might Place Children At Risk

Personal Privacy: Online facial recognition search engine PimEyes allows anyone to search for images of children scraped from the Internet.

2022-11-21

Google Ordered To Pay $391m To Settle Privacy Violations

Covert Location Tracking Since 2014: Google has agreed to pay $391.5m (£330m) to settle allegations about how it collected data from US users.

2022-11-16

The Internet Of "vulnerable" Things?

Being Smart And Being Secure Are Not Always The Same: How can we be both hyperconnected and secure? By Sarah Daun & Caroline Churchill 

2022-11-15

Guilty: A Criminal Conviction For One CISO Has Consequence For Others

Doing The Right Thing: Uber’s ex-security chief has been found guilty in a US court - what does that mean for CISOs in the UK? By Nigel Jones

2022-10-24

New EU Cyber Security Legislation Targets Cyber Crime

The EU's proposed Cyber Resilience Act aims to ensure that consumers' connected devices and software comply with cyber security safeguards.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Contrast Security

Contrast Security

Contrast Security is the leader in modernized application security, embedding code analysis and attack prevention directly into software.

Mimecast

Mimecast

Mimecast delivers cloud-based email management for Microsoft Exchange and Microsoft Office 365 including archiving, continuity and security.

National Cyber Directorate Israel

National Cyber Directorate Israel

The Israeli National Cyber Directorate provides incident handling services for civilian entities and critical infrastructures and works to increase national resilience against cyber threats.

Asigra

Asigra

Asigra provides an industry leading cloud backup and recovery software platform called Asigra Cloud Backup.

CERT-IS

CERT-IS

CERT-IS is the national Computer Emergency Response Team for Iceland.

Seqrite

Seqrite

Seqrite offers a highly advanced range of enterprise and IT security solutions to protect your organization's most critical data.

IT Security Jobs

IT Security Jobs

IT Security Jobs is a dedicated portal for everything related to IT professionals looking for IT Security jobs.

Elysium Analytics

Elysium Analytics

Elysium Cognitive Security Analytics delivers the latest and most flexible security system to reduce cost and complexity while providing unmatched scalability.

BrandShelter

BrandShelter

BrandShelter specializes in providing online brand protection for companies and trademark owners.

CENSUS

CENSUS

CENSUS is a Cybersecurity services provider offering services to multiple industries worldwide such as Security Testing, Code Auditing, Secure SDLC, Vulnerability Research and Consulting Services.

Tech Vedika

Tech Vedika

Tech Vedika has access to technical guidance, training and resources from AWS to successfully undertake solution architecture, application development, application migration, and managed services.

Chestnut Hill Technologies (CHT)

Chestnut Hill Technologies (CHT)

CHT provide Best Practices IT Cybersecurity and Technology Solutions and Consulting Support to the Mid Cap through Fortune 1000 Nationwide.

Boltonshield

Boltonshield

Boltonshield provide a unique and proactive approach to cyber defence with managed security services, integrated technologies, and a team of security experts, ethical hackers and analysts.

SecuLore

SecuLore

An innovator in public-safety-focused cybersecurity, SecuLore is dedicated to protecting critical infrastructure from cyber attacks.

Operational Systems (OpSys)

Operational Systems (OpSys)

OpSys is a leading Managed IT and Cyber Security provider protecting the critical elements of businesses across the globe.

DeepSurface Security

DeepSurface Security

DeepSurface is the first risk-based vulnerability management platform that allows cybersecurity teams to automate the process of analyzing and prioritizing vulnerabilities.