European Cybersecurity Directive moves closer to becoming a reality

The European Union's draft directive regarding network and information security ("the Directive") took one step closer to becoming law on 23 January 2014, when...

MEPs vote strongly in favour of the proposed European Cybersecurity Directive

  The European Parliament today voted to approve the draft Network and Information Security Directive (known colloquially as the Cybersecurity Directive), which contains new rules...

Data Protection, Privacy and Cybersecurity in the Internet of Things

Privacy Context ‘Pretty soon, even your trousers will have their own Twitter account,’ wrote Paul Ford in Hemispheres magazine. Devices communicating Machine to Machine (M2M)...

Cybersecurity and the food supply chain

Cybersecurity is an increasingly important issue for many in the food and beverage sector as the growing reliance on information systems for business critical...

Cybersecurity concerns in food and beverage organisations: Interview with Chia Ling Koh

Cybersecurity breaches against retail companies have been heavily discussed in the last year. The food and beverage industry is very similar to retail, using...

Digital Single Market: Sample post

This is an article about how the Digital Single Market came to be.

Internet of Things: Sample post 2

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Integer sagittis bibendum tortor eget elementum. Fusce ultricies eros aliquam massa iaculis, vel suscipit tellus egestas....

Cloud Computing: sample article 1

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Integer sagittis bibendum tortor eget elementum. Fusce ultricies eros aliquam massa iaculis, vel suscipit tellus egestas....

Bird & Bird launches new and improved Cloud Computing App

Bird & Bird launched the third version of its Cloud Computing app today, which allows suppliers and users of cloud services to easily determine...

Cloud computing and privacy series: legal issues related to sensitive (health) data (part 6...

This sixth and final article of our cloud computing and privacy series (links to our previous articles below) discusses the legal issues related to...