TECHNOLOGY > Key Areas > Social Media


« Back to News

2018-03-16

Cyberbullying Attacks the Young

Facebook, Snapchat & Twitter stand accused of failing to protect young people from harassment, with consequent mental health problems.

2018-03-01

The Web Is Dying. Make Way For The Trinet

The underlying dynamics of power on the Web have changed and three companies are at the center of a fundamental transformation of the Web.

2018-02-27

Eight Reasons Why Facebook Has Peaked

Suspicions are growing that Mark Zuckerberg and his team have unleashed something that they cannot control, and may have already peaked.

2018-02-19

Facebook Personal Data Use & Privacy Settings Ruled Illegal

German court rules that Facebook collects and uses personal data without providing enough information to users for them to give meaningful consent.

2018-02-16

Facebook Enables 'Fake News'

Digital Deceit: More people are coming to the conclusion that social networking is an overall negative for society.

2018-02-16

Inspired: China Measures Citizens' Trustworthiness

China is exploring how AI & Big Data can be used to monitor social media interactions and has plans to assign citizens a 'social-reliability' rating.

2018-02-05

Facebook & Google Are ‘A Menace to Society’

Facebook and Google have become “obstacles to innovation” and are a “menace” to society whose “days are numbered”.

2018-01-31

You Probably Don’t Know All the Ways Facebook Tracks You

When you sign up with Facebook you become their product. You might not realise just how deep or extensive their tracking of your behaviour goes.

2018-01-31

Facebook Names IBM Watson Executive AI Chief

Facebook brings in an experienced ex-IBM manager to navigate the company’s broadening ambitions for how AI can shape its products.

2018-02-05

Iran Adopts Russian Style CyberWar Tactics

The Iranian regime has deployed cyber trolls and online bots to push back against online dissent and influence social media trends.

2018-01-29

Google’s AutoML Offers Machine Learning Models Without Having To Code

AutoML Vision helps developers, including those with no machine learning expertise, build custom image recognition models.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Imperva

Imperva

Imperva is a leading provider of data and application security solutions including DDoS protection, Web application security, Data security and Cloud security.

CERT.br

CERT.br

The Brazilian national Computer Emergency Response Team

NATO Communications and Information Agency (NCIA)

NATO Communications and Information Agency (NCIA)

The NCIA Cyber Security Service Line is responsible for planning and executing all life cycle management activities for cyber security.

Bitcrack

Bitcrack

Bitcrack Cyber Security helps your company understand and defend your threat landscape using our key experience and skills in cybersecurity, threat mitigation and risk.

Nucleon Security

Nucleon Security

Nucleon Endpoint Detection and Response EDR is the most effective way to protect the value created by your organization against any threat.

Association of Azerbaijani Cyber Security Organizations (AKTA)

Association of Azerbaijani Cyber Security Organizations (AKTA)

The Association of Azerbaijani Cyber Security Organizations (AKTA) is a non-commercial organization aimed at strengthening the country's cybersecurity system.

Qeros

Qeros

Qeros is a next-generation distributed system enables secure data and transaction processing at the velocity of thought.

Dapple Security

Dapple Security

Dapple Security is creating cutting edge technology utilizing responsible biometrics that protects people and privacy through a first-of-its-kind passwordless platform.

InnovateHer

InnovateHer

At InnovateHer, our vision is to make the tech sector more equitable, by increasing diversity across the spectrum and creating more inclusive workplaces.

DataProof Communications

DataProof Communications

DataProof Communications is Cybersecurity Company specialising in cybersecurity operations, incident management and response best practices and technologies.

Index Engines

Index Engines

Index Engines is the world’s leading AI-powered analytics engine to detect data corruption due to ransomware.

NuKuDo

NuKuDo

NukuDo redefine the boundaries of cybersecurity talent development. We are dedicated to cultivating top-tier professionals equipped to tackle the complex challenges of cybersecurity.

Amtivo Group

Amtivo Group

Amtivo provides Certification, Inspection and Training services to national and local Government bodies, multi-nationals, enterprise clients and SMEs.

NetAlly

NetAlly

NetAlly network test solutions help engineers and technicians better deploy, manage, maintain, and secure today’s complex wired and wireless networks.

CBIT Digital Forensics Services (CDFS)

CBIT Digital Forensics Services (CDFS)

CDFS is Australia’s premier supplier of digital forensic tools, industry-embedded training and certification to Law Enforcement, Government, and Corporate Enterprise.

Quantum Bridge

Quantum Bridge

Our unbreakable key distribution technology ensures the highest level of protection for your critical infrastructure and sensitive data in an evolving digital landscape.