TECHNOLOGY > Key Areas > Social Media


« Back to News

2018-01-23

Facebook Users To Rank The News They Trust

Facebook plans to diminish its role as an arbiter of the news people see and will rank news organisations by credibility based on user feedback.

2018-01-22

Twitter Reveals True Extent Of Russian US Election Posts

Twitter has admitted that a far greater number of Russia-linked accounts posted material about the 2016 US election than it has previously disclosed.

2018-01-17

Iran’s Internal Conflict Plays Out On Social Media

Disinformation, Bots, #Hashtag wars. The civil unrest on the streets of Iran is being mirrored on social media, where government and protesters clash.

2017-12-08

Australia To Challenge Facebook & Google Over Media Disruption

Australian media companies are being squeezed hard as advertising dollars follow eyeballs to the giant US digital distribution platforms.

2017-12-08

Fake News & Botnets: Russia Has Weaponised The Web

The core concept of cyberwar is psychological manipulation, executed with targeted digital disinformation to weaken a country from within.

2017-12-06

Facebook Delivers AI To Detect Suicidal Posts

Using a combination of AI, human moderators and crowdsourced reports, Facebook hopes to prevent suicidal tragedies.

2017-11-20

Russian Fake Brexit Tweets & Attacks On The UK

The National Cyber Security Centre publicly confirms that Russia has made cyber attacks on major UK energy, technology & media companies.

2017-11-10

Tech Giants Face US Congress Over Russia Election

A showdown between Congress and the powerful social media companies that have helped define the current unsettled age in western democracies.

2017-11-28

Social Media & Crisis Management

Social media has the power to connect people instantly. For security managers, it's the most powerful tool for controlling information.

2017-11-02

Social Media & 21st-Century Warfare

Russia’s use of social media to influence the US elections demonstrates how warfare has moved away from the battlefield and toward the Internet.

2017-12-01

Social Media - 'Jargon-Busted'

A set of jargon-busting guides that teach children about their rights on social media sites has been published.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Lantronix

Lantronix

Lantronix is a global provider of secure data access and management solutions for Internet of Things (IoT) and information technology assets.

Interpol

Interpol

Interpol is the world’s largest international police organization. It is committed to the global fight against cybercrime, as well as tackling cyber-enabled crimes.

Cyber Data-Risk Managers

Cyber Data-Risk Managers

Cyber Data-Risk Managers Pty Ltd is an insurance broker based in Melbourne, Australia specializing in Cyber insurance / Data breach insurance.

Apcon

Apcon

Apcon's mission is to provide valuable network insights that enable security and network professionals to monitor, secure and protect their data in both physical and virtual environments.

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID) is the first platform in Indonesia to collect and validate reports from hackers (referred to as Bug Hunter) regarding vulnerabilities that exist in an organization.

CTM360

CTM360

CTM360® is a Cyber Security subscription service offering 24 x 7 x 365 Cyber Threat Management for detecting and responding to cyber threats.

Seconize

Seconize

Seconize empowers enterprises to proactively manage their cyber risks, prioritize remediations, optimize security spending and ensure compliance.

ShorePoint

ShorePoint

ShorePoint helps customers focus on visibility, analytics and context to make timely and informed risk-based decisions to protect their infrastructure.

CybX Security LLC

CybX Security LLC

CybX is the first company of its kind to merge the practice of computer forensics with computer security and information security.

MillenniumIT ESP (MIT ESP)

MillenniumIT ESP (MIT ESP)

MillenniumIT ESP provides solutions and services around Core Infrastructure, Cloud, Cyber Security, Enterprise Applications, Intelligent Automation and Data, Smart Buildings, and Managed Services.

Trustifi

Trustifi

Trustifi leads the market with the easiest to use and deploy email security products, providing both inbound and outbound email security from a single vendor.

Stryve

Stryve

Stryve is a leading carbon-neutral provider of specialist cloud and cybersecurity services in Europe.

Wavenet

Wavenet

Wavenet has grown from simple beginnings to become one of the UK’s market leaders in unified communications, business telephony, and Cyber Security solutions.

Cygna Labs

Cygna Labs

Cygna Labs is a software developer and one of the top three global DDI (DNS, DHCP, and IP address management) vendors.

SignMyCode

SignMyCode

SignMyCode is a one-stop shop for trusted and authentic code signing solutions to safeguard software.

Turngate

Turngate

Turngate simplify security investigations so you can see employee activities and entitlements in your enterprise in seconds.