TECHNOLOGY > Key Areas > Social Media


« Back to News

2021-07-05

Data Dominance: EU Investigates Google

The investigation will examine Google's role in collecting data, selling advertising space and acting as an online-advertising intermediary.

2021-06-25

Social Media’s Effects On Mental Health

Life Online: While social media has its benefits, it’s important to remember that it can never be a replacement for real-world human connection.

2021-06-21

US Legislators Take Aim At Big Tech Companies

Antitrust Reform: US lawmakers have introduced five separate bills aimed at limiting the power held by the five 'Big Tech' companies.

2021-06-08

Criminal Messaging App Leads To Widespread Arrests

Operation Trojan Shield: 800 suspected criminals arrested, 8 tons of cocaine and $48m seized in a Police sting using a fake secure messaging app.

2021-05-17

British Law To Protect Online Users

Social media firms will have to remove harmful content quickly or potentially face multi-billion-pound fines under new British legislation.

2021-05-10

Trump Dodges Social Media Ban

Donald Trump launches a new "communications" website, which says it will publish content "straight from the desk" of the former US president.

2021-05-03

Facebook And Apple Clash

A new feature is being introduced to iPhones and iPads which is causing a serious disagreement between Apple and Facebook over user privacy.

2021-04-27

MI5 Joins Instagram

MI5 is joining Instagram in a bid to increase its transparency and content posted will include previously undisclosed archive documents.

2021-04-18

Trump's Family Get Blocked On Facebook

Facebook and the other US social media platforms seem ready to make arbitrary decisions on what may, or may not appear on their users' pages.

2021-04-12

How Do The Facebook & LinkedIn Data Leaks Impact Their Users?

Data leaks can hurt both individuals & organizations in a big way. What can social media users do to protect themselves? By Peter Baltazar

2021-04-09

Half A Billion LinkedIn Members Found For Sale

LinkedIn Sliced Open: IDs, names and email addresses comprise a massive archive of stolen data, placing 500 million LinkedIn users at risk.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Bundesdruckerei

Bundesdruckerei

Bundesdruckerei specializes in secure identity technologies and services for protecting sensitive data, communications and infrastructures.

Thinklogical

Thinklogical

Thinklogical manufactures secure, KVM, video, audio, and computer peripheral signal switching solutions for defence C4ISR applications.

Apricorn

Apricorn

Apricorn provides hardware-based 256-bit encrypted external storage products to companies and organizations that require high-level protection for their data at rest.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Avatier

Avatier

Avatier identity management software products automate identity access management, user provisioning and IT governance to ensure information security and compliance.

TechArch

TechArch

TechArch helps customers to optimize their investments in cybersecurity by providing them independent and vendor-neutral consultation and guidance.

CipherTrace

CipherTrace

CipherTrace develops cryptocurrency Anti-Money Laundering, cryptocurrency forensics, and blockchain threat intelligence solutions.

Nakivo

Nakivo

NAKIVO is dedicated to delivering the ultimate backup, ransomware protection and disaster recovery solution for virtual, physical, cloud and SaaS environments.

AdaCore

AdaCore

AdaCore is focused on helping developers build safe, secure and reliable software.

DataSixth Security Consulting

DataSixth Security Consulting

DataSixth delivers Cybersecurity Intelligence. With our unique capabilities, we’re able to deliver value, deliver answers, and deliver actionable security intelligence.

Circle Security

Circle Security

Circle’s breakthrough security API unifies solutions for identity and data security into one architecture and empowers organizations to secure their identity, data and privacy in their applications.

Unit 42

Unit 42

Unit 42 brings together world-renowned threat researchers, incident responders and security consultants to create an intelligence-driven, response-ready organization.

Vigilant Ops

Vigilant Ops

Vigilant Ops is a leader in Software Bill of Materials (SBOM) Automation. A proactive approach to cybersecurity with continuous vulnerability monitoring.

System360

System360

System360 is one of Houston's top suppliers of network administration, design, security, and support services.

Scinary Cybersecurity

Scinary Cybersecurity

Scinary was founded in 2015 on the premise that cybersecurity should not be limited to just large corporations or large government entities.

Shepherd

Shepherd

Shepherd's mission is to empower IT teams with solutions that simplify endpoint management, enhance security, and adapt to the evolving complexities of modern work environments.