TECHNOLOGY > Key Areas > Social Media


« Back to News

2021-06-25

Social Media’s Effects On Mental Health

Life Online: While social media has its benefits, it’s important to remember that it can never be a replacement for real-world human connection.

2021-06-21

US Legislators Take Aim At Big Tech Companies

Antitrust Reform: US lawmakers have introduced five separate bills aimed at limiting the power held by the five 'Big Tech' companies.

2021-06-08

Criminal Messaging App Leads To Widespread Arrests

Operation Trojan Shield: 800 suspected criminals arrested, 8 tons of cocaine and $48m seized in a Police sting using a fake secure messaging app.

2021-05-17

British Law To Protect Online Users

Social media firms will have to remove harmful content quickly or potentially face multi-billion-pound fines under new British legislation.

2021-05-10

Trump Dodges Social Media Ban

Donald Trump launches a new "communications" website, which says it will publish content "straight from the desk" of the former US president.

2021-05-03

Facebook And Apple Clash

A new feature is being introduced to iPhones and iPads which is causing a serious disagreement between Apple and Facebook over user privacy.

2021-04-27

MI5 Joins Instagram

MI5 is joining Instagram in a bid to increase its transparency and content posted will include previously undisclosed archive documents.

2021-04-18

Trump's Family Get Blocked On Facebook

Facebook and the other US social media platforms seem ready to make arbitrary decisions on what may, or may not appear on their users' pages.

2021-04-12

How Do The Facebook & LinkedIn Data Leaks Impact Their Users?

Data leaks can hurt both individuals & organizations in a big way. What can social media users do to protect themselves? By Peter Baltazar

2021-04-09

Half A Billion LinkedIn Members Found For Sale

LinkedIn Sliced Open: IDs, names and email addresses comprise a massive archive of stolen data, placing 500 million LinkedIn users at risk.

2021-04-06

Over 500m Facebook Users' Data Posted On A Hacking Website

The personal information of about half a billion Facebook users, including their phone numbers, have been posted to a website used by hackers.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Get Cyber Safe

Get Cyber Safe

Get Cyber Safe is a national public awareness campaign created to educate Canadians about Internet security and the simple steps they can take to protect themselves online.

Linklaters LLP

Linklaters LLP

Linklaters is an international law firm. Practice areas include Information Management and Data Protection.

Marsh

Marsh

Marsh is a global leader in insurance broking and risk management and has been a leader in combatting cyber threats since their emergence.

Boxcryptor

Boxcryptor

Boxcryptor encrypts your sensitive files before uploading them to cloud storage services.

Genie Networks

Genie Networks

Genie Networks is a leading technology company providing networking and security solutions for optimizing the performance of large networks.

CalCom

CalCom

CalCom Hardening Solution (CHS) for Microsoft OMS is a security baseline-hardening solution designed to address the needs of IT operations and security teams.

TruSTAR Technology

TruSTAR Technology

TruSTAR is a threat intelligence exchange platform built to protect and incentivize information sharing.

Atempo

Atempo

Atempo is a leading independent European-based software vendor with a global presence. We provide solutions to protect, store, move and recover all your data.

Stratum Security

Stratum Security

Stratum Security is an information security consulting company that focuses on providing clear and concise risk guidance to its clients through high quality assessment services.

UnderDefense

UnderDefense

UnderDefense provides cyber resiliency consulting and technology-enabled services to anticipate, manage and defend against cyber threats.

Spec

Spec

Spec is the only no-code orchestration platform that protects enterprise fraud defenses from being blocked, bypassed, and manipulated by modern attack tactics.

Custom Computer Specialist (CCS)

Custom Computer Specialist (CCS)

CCS offers an extensive range of services including cybersecurity solutions, consulting, implementation, and support to help our clients maximize the value derived from IT investments.

APIsentry

APIsentry

APIsentry is a leading provider of comprehensive API security solutions, specializing in protecting organizations from a wide range of cyber threats targeting their Application Programming Interfaces.

Cipher Net Shield

Cipher Net Shield

Cipher Net Shield specializes in secure E-wallet solutions with a strong focus on blockchain and cybersecurity, prioritizing both transaction security and the recovery of lost capital.

BCX

BCX

BCX, a subsidiary within Telkom Group, is one of Africa’s largest systems integrator and digital transformation partners for enterprises and public sector organisations.

Nuke From Orbit

Nuke From Orbit

Nuke's mission is to put you back in control of your digital identity when your smartphone gets stolen.