TECHNOLOGY > Key Areas > Social Media


« Back to News

2016-10-31

ISIS Social Media Ops Are Declining

The war against the Islamic State seems to have hit a turning point, both on the battlefield and on social media.

2016-11-10

Google’s Ad Tracking Is Just As Creepy As Facebook's

Google has changed the way it tracks its users across the internet, merging users' personal identity data across Gmail, YouTube without consent.

2016-09-30

Twitter On The Block: Offers Over $13B

Both Google and Salesforce are interested in buying the company. Microsoft and Verizon have also been knocking.

2016-09-21

Social Media Sites - Cyber Weapons of Choice

Facebook, LinkedIn and Twitter can't secure their own environments, let alone yours. It's time to sharpen your security know-how.

2016-09-13

Facebook, Twitter and Google Are A 'recruiting platform for terrorism''

The Social Network: Facebook, Twitter & Google are deliberately failing to stop terrorists using their websites to promote terror say British MPs.

2016-08-31

Psychological Warfare On Social Media

Twittersphere: Cyberwar between India and Kashmiri insurgents is hotting up with a big PsyOps element, focused on social media.

2016-08-16

What Executives Really Should Know About Social Media

Executive social media accounts are the first places many malicious attackers go when gathering target intelligence.

2016-07-27

US Defense Intelligence Agency Is Researching Employee Social Media Histories

The Pentagon is researching a "social media checks" pilot scheme that would analyze public posts to help determine an employee's suitability.

2016-07-18

The Global War of Narratives and the Role of Social Media

The unique characteristic of social media is that it empowers and enables individuals to engage in ways previously unseen. Opinion by Anja Kaspersen.

2016-06-21

Twitter Blocks Data Access By US Spy Agencies

Twitter has banned US intelligence agencies from using it's Dataminr alert service.

2016-06-19

Iran Wants To Collect All Social Network Data

The Iranian government wants tighter controls on all foreign messaging and social media apps operating in the country.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cyberis

Cyberis

Cyberis are pioneers in customer-focussed information security. Since 2011, we’ve been helping businesses protect their brands, customers and reputation.

Rambus Security Division

Rambus Security Division

Rambus Security Division solutions span areas including tamper resistance, content protection, network security, mobile payment, smart ticketing, and trusted provisioning services.

Hogan Lovells

Hogan Lovells

Hogan Lovells is an international business law firm with offices across Europe, Asia and the USA. Practice areas include Privacy & Cybersecurity.

CIRT.GY

CIRT.GY

CIRT-GY is the national Computer Incident Response Team for Guyana.

Riscure

Riscure

Riscure is a global test lab and tools leader for device security. Core expertise in side channel analysis, fault injection and embedded device software.

SecuGen

SecuGen

SecuGen is a leading provider of advanced, optical fingerprint recognition technology, products, tools and platforms for physical and information security.

NAVEX Global

NAVEX Global

NAVEX Global’s compliance management system consolidates your entire GRC program onto a scalable cloud-based platform.

Hornetsecurity

Hornetsecurity

Meet Hornetsecurity – Leading Cloud Email Security Provider. We protect global organizations so you can focus on what you do best.

DeuZert

DeuZert

DeuZert is an accredited German certification body in accordance with ISO/IEC 27001 (Information Security Management).

Archivo

Archivo

Archivo is a value added reseller focused on Disaster Recovery as a Service (DRaaS), backup, hyper-convergence, hybrid storage and Cyber security.

Eco Recycling (Ecoreco)

Eco Recycling (Ecoreco)

Eco Recycling is India's first and leading professional E-waste Management Company that has set industry benchmarks with its innovative & environment friendly disposal practices.

EVOKE

EVOKE

EVOKE is an award-winning Digital Transformation company that partners with its clients to build digital workplace solutions for organizational challenges.

Digitale Gründerinitiative Oberpfalz (DGO)

Digitale Gründerinitiative Oberpfalz (DGO)

Digital Founder Initiative Oberpfalz's goal is to build a sustainable start-up culture in the field of digitization throughout the Upper Palatinate district of Bavaria.

Gilsbar

Gilsbar

For more than half a century, Gilsbar has offered insurance service solutions and support for businesses and their employees.

JLS Technology

JLS Technology

Since 2007, JLS Tech has been recognized as one of the world’s most innovative cybersecurity and technology operations leaders.

National Renewable Energy Laboratory (NREL)

National Renewable Energy Laboratory (NREL)

NREL is transforming energy through research, development, commercialization, and deployment of renewable energy and energy efficiency technologies.