Ben Evans takes a timely comparative look at the approaches of the EU and Türkiye to digital sovereignty, with a focus on cloud computing. This blog was published first by NASAMER Law Blog, Koç University Law School, Türkiye on 23 January 2026. Overview Digital sovereignty, which may be defined broadly as the ability of a state…

Read More… from Digital Sovereignty in the Cloud: Between Law and Industrial Policy in the European Union and Türkiye

Emma Hewins looks at the regulatory challenges presented by the emergence of crypto casinos. “My ventures are not in one bottom trusted,Nor to one place; nor is my whole estateUpon the fortune of this present year:Therefore my merchandise makes me not sad.”William Shakespeare, The Merchant of Venice Gambling has deep roots, but the modern casino…

Read More… from Rolling the Dice in the Shadow Realm: Regulatory Challenges of Crypto Casinos

Wes Walker and Freya Ollerearnshaw look at how injunctions can be helpful in response to a cyber attack Picture this: you’re an executive facing a nightmare cyber-attack scenario. An email has just hit your inbox from an unknown perpetrator claiming to have hacked your systems and stolen data. They are demanding a ransom: if you…

Read More… from Taking the Hackers to Court: Why Injunctions Should Be Part of Your Cyber Response Playbook

Jack Barradell-Johns walks through a revealing example showing how AI integration can cause vulnerabilities in commonly used tools Introduction SharePoint is a Microsoft platform that enables collaborative working and information sharing. This is done with team sites. They work like regular intranet pages with graphics and text, but they also give you places to store…

Read More… from Exploiting Copilot AI for SharePoint

As data centres become a critical part of our infrastructure, Peter Dalton, Adil Tirmizi and Sophia Wah review the current risks and regulations around them. Demand for data centres continues to grow globally, driven by increased computing requirements for AI and continued demand for data and connectivity, the trend towards cloud computing and IOT capability….

Read More… from Data centres: emerging risks and regulation

Mark Hendry explains how good AI governance is a now cornerstone of cybersecurity AI is already embedded into our day-to-day personal and professional lives. As adoption expands, so do questions about how to govern its use within and across organisations. With the horse having already bolted, will attempts at governance be meaningless, after-the-fact endeavours for…

Read More… from Turning AI Governance and Observability into Business Advantage

The Clorox Company (Clorox) recently filed a $380 million lawsuit against Cognizant, its IT services provider. In this article, Ngaire Guzzetti, discusses the importance of contract due diligence, continual testing of controls and the growing threat that is supply chain risk. The 2023 Breach and the 2025 Lawsuit Manufacturer The Clorox Company (Clorox) recently filed a…

Read More… from Why is the Clorox Lawsuit Against Cognizant a Wake-Up Call for Third-Party Cyber Risk?

Camilo Artiga-Purcell flags up some of the cybersecurity, data protection and privilege risks associated with client-intake forms. Solicitors and barristers across England and Wales have embraced digital transformation, adopting sophisticated case management systems, e-discovery platforms, and document automation tools. Yet many overlook a critical vulnerability: the web forms used to collect confidential client and prospective…

Read More… from Attorney-Client Privilege at Risk: The Hidden Danger in Digital Intake Forms