TECHNOLOGY > Key Areas > Social Media


« Back to News

2017-10-10

China Disrupts WhatsApp

The messaging service WhatsApp has been disrupted in China as the government steps up security ahead of the Communist Party Congress.

2017-10-20

Russia Plans To Shut Facebook For Its Election

Russia’s communications watchdog has threatened to shut down Facebook if it fails to comply with a controversial law on data storage.

2017-10-19

Facebook's Algorithm And Russian Ads

The algorithms have done their job, but criticism of Facebook's handling of racist content, fake news and malicious electoral influence are growing.

2017-10-13

Will Germany's New Social Media Law Kill Free Speech?

A new law in Germany that will impose huge fines on social networks for not deleting illegal content has attracted an unusual collection of opponents.

2017-10-02

Facebook To Give Congress Thousands Of Election Ads Bought By Russians

Full Disclosure: Facebook will provide US Govt. thousands of ads purchased by Russians during the 2016 US presidential race.

2017-09-21

Bashing Facebook Is Not The Answer To Curbing Russian Influence Operations

Scapegoating Facebook is an easy way to explain Russian influence on the US election, but distracts from more fundamental questions.

2017-09-16

Facebook T0 Spend $1b On VideoProduction

Facebook plans to invest $1 billion to fund original content initiatives for its new Watch video platform aimed at competing with Apple.

2017-09-27

Fake Facebook Ads Surged During The US Presidential Election

Facebook now admits that fake accounts probably operated from Russia bought thousands of divisive advertisements on during the 2016 US election.

2017-09-13

Millions of Instagram Users Hacked

Claims that six million Instagram accounts have been hacked and 'Facebook/Instagram has not yet fully understood the full scope of the exploit'.

2017-09-11

Police Spy On Their Own: Twitter Accounts Scrutinised

Revealed: A year-long probe into the anonymous Twitter accounts of officers of the Police Service of Northern Ireland (PSNI).

2017-08-15

Are Children 'Bingeing' on Social Media?

The British Children’s Commissioner advises parents that they must intervene to stop their children overusing social media.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for Cybersecurity and Cybercrime Investigation is Europe's leading centre for research & education in cybersecurity, cybercrime and digital forensics.

APWG

APWG

APWG is the international coalition unifying the global response to cybercrime across industry, government, law-enforcement and NGO communities.

Fasoo

Fasoo

Fasoo provides data-centric security to protect data within the organizational perimeter and beyond by limiting access to sensitive data according to policies that cover both users and activities.

e-Governance Academy (eGA)

e-Governance Academy (eGA)

eGA is a think tank and consultancy founded for the transfer of knowledge and best practice in e-governance, e-democracy and national cyber security.

Ridgeback Network Defense

Ridgeback Network Defense

Ridgeback is an enterprise security software platform that defeats malicious network invasion in real time. Ridgeback champions the idea that to defeat an enemy you must engage them.

Ceerus

Ceerus

Ceerus was created to simplify the process of deploying and managing security across all the channels in an organisation.

Zen360Consult

Zen360Consult

Zen360Consult provides Advisory and Training services in the field of Cyber Resilience, which includes Cyber Security /ISMS and Business Continuity.

TechStak

TechStak

TechStak is the easiest way for businesses to find and connect with IT Pros and other technology solution providers in their area.

Hub One

Hub One

Hub One is a leading player in digital transformation with expertise in broadband connectivity, business solutions for traceability and mobility, IOT in industrial environments and cybersecurity.

Riskaware

Riskaware

CyberAware, by Riskaware, provides business-critical cyber attack analysis and impact assessments using NIST standards aligned with NCSC guidance.

WhiteHawk

WhiteHawk

WhiteHawk is the first online Cyber Security Exchange. We help you understand your cyber risk and match you to tailored and affordable solutions.

QGroup

QGroup

QGroup has been re-designing the consultancy industry since 2012. We're a rapidly expanding group of consulting companies that deliver bespoke IT services including cybersecurity.

Solvere One

Solvere One

Solvere One is a managed service provider (MSP) focused on corporate consulting and partnership.

Parablu

Parablu

Parablu is a leading provider of data security and resiliency solutions for the digital enterprise.

Gutsy

Gutsy

Gutsy uses process mining to help organizations visualize and analyze their complex security processes to understand how they actually run, based on observable event data.

Oduma Solutions

Oduma Solutions

Oduma Solutions is a wholly owned Ghanaian Cybersecurity company that offers information security services to organisations seeking to improve their security posture.