Articles

October 28, 2025

EASM buyer's guide now available

How to choose an external attack surface management (EASM) tool that’s right for your organisation.
October 27, 2025

EVENT ALERT | Spazio europeo dei dati sanitari e sanità digitale

MediaLaws è lieta di segnalare il seminario “Spazio europeo dei dati sanitari e sanità digitale”. L’evento si terrà il 28 ottobre 2025, dalle 9:00 alle 18:00 […]
October 24, 2025

EVENT ALERT | GenAI in legal practice – a fundamental rights perspective

MediaLaws is pleased to share the event “GenAI in legal practice – a fundamental rights perspective”, the 2nd European Scientific Legal Tech Summit at Vienna University […]
October 22, 2025

The Re-orientation of AI policy in a tense geopolitical scenario

From Regulation to Innovation – the Washington effect In the last few years, the “classic” tension between regulation and innovation shaped in AI policy debates has […]
October 21, 2025

Cyber security is business survival

The NCSC co-signs Ministerial letter to major British businesses including FTSE 350 companies.
October 17, 2025

Rights-proof simplification: the DigCon Project’s contribution to the EU’s Digital Omnibus consultation

The DigCon project, funded under the FIS programme and hosted at Bocconi University, explores how fundamental rights can be protected and enforced in what scholars call […]
October 14, 2025

CALL FOR PAPER | Originality, Automated Writing and the Use of AI Detection in Academia: A Multidisciplinary and Comparative Approach

MediaLaws is sharing the call for papers titled “Originality, Automated Writing and the Use of AI Detection in Academia: A Multidisciplinary and Comparative Approach”, organised by […]
October 14, 2025

From innovation to deployment: How China is reshaping the future of AI governance

From innovation to deployment: How China is reshaping the future of AI governance Jun Wu, Fudan University, Shanghai, China PUBLISHED ON: 14 Oct 2025 At the 2025 […]
October 14, 2025

There's a hole in my bucket

…or ‘Why do people leave sensitive data in unprotected AWS S3 buckets?’