TECHNOLOGY > Key Areas > Social Media


« Back to News

2021-08-26

Islamic State Propaganda Is Persistent

Jihadist terrorist groups dedicate significant efforts to set up effective online communication campaigns and they are definitely not going away.

2021-08-23

Seven Ways That Social Media Sabotages Cyber Security

Warning: Having a social media webpage affects your cyber security. Although social media can do a lot for you, it can also take a lot away from you.

2021-08-18

Facebook Bans The Taliban

The Taliban presents a fresh challenge for social media companies over content created by the Islamic group, considered by many to be terrorists.

2021-08-18

The Taliban's Mastery Of Information Warfare

The Taliban have used modern information warfare techniques, combining fake accounts and bots, to successfully undermine the Afghan government.

2021-11-12

Cyber Operations In Wartime

Policymakers and military leaders need to broaden their assumptions about how state and non-state actors will use cyber operations in future conflicts.

2021-08-09

Looking For Love May Have Unexpected Consequences

Warning: Be cautious when using dating platforms as evidence reveals criminals have successfully conned over £15 million from unsuspecting lovers.

2021-07-30

Twitter Celebrity Hack Suspect Arrested

Hackers took control of public figures' accounts to send a series of tweets asking followers to transfer crypto currency to a specific Bitcoin wallet.

2021-07-27

Was There A Russian Plot To Put Trump In The White House?

An unprecedented leaked document from Moscow suggests that Vladimir Putin launched a secret multi-agency effort to get Trump elected in 2016.

2021-07-19

Scientists Say Social Media Is A Risk To Humanity

Social media has completely changed the way we communicate and the collective behavioral effects of new technology on humans can be destructive.

2021-07-05

Data Dominance: EU Investigates Google

The investigation will examine Google's role in collecting data, selling advertising space and acting as an online-advertising intermediary.

2021-06-25

Social Media’s Effects On Mental Health

Life Online: While social media has its benefits, it’s important to remember that it can never be a replacement for real-world human connection.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Vertical Structure

Vertical Structure

Vertical Structure services include Security & Penetration Testing, Information Assurance, Bespoke Training Programs and Secure Hosting.

Endace

Endace

Endace is a leader in network visibility, network recording and packet capture solutions for security, network and application performance monitoring.

Original Software

Original Software

Original Software offers a test automation solution focused completely on the goal of effective software quality management.

Red Canary

Red Canary

Red Canary continuously monitors and analyzes your endpoints, users, and network activity in search of threatening behaviors, patterns, and signatures.

OpenText

OpenText

OpenText is a leader in Enterprise Information Management software and a portfolio of related solutions for Information Governance, Compliance, Information Security and Privacy.

Institute for Cybersecurity & Privacy (ICSP) -  University of Georgia

Institute for Cybersecurity & Privacy (ICSP) - University of Georgia

The goal of ICSP is to become a state hub for cybersecurity research and education, including multidisciplinary programs and research opportunities, outreach activities, and industry partnership.

New Zealand Internet Task Force (NZITF)

New Zealand Internet Task Force (NZITF)

The New Zealand Internet Task Force (NZITF) is a non-profit with the mission of improving the cyber security posture of New Zealand.

DOS

DOS

DOS is an Ecuadorian company with 3 decades of presence in the market and extensive experience in the planning, management and execution of IT Service Integration Projects.

OcuCloud

OcuCloud

OcuCloud protects businesses' valuable information in the cloud, preventing security breaches caused by employees and remote vendors.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ArmorText

ArmorText

ArmorText offers a seamless channel for communication and collaboration for organizations concerned with keeping communication data private and secure.

Netizen

Netizen

Netizen is an award-winning company that develops and leverages innovative solutions to enable a more secure cyberspace for clients in government and commercial markets.

Ibento Global

Ibento Global

Ibento organises the CyberX series of cybersecurity conferences.

HCS

HCS

HCS is an IT Company and Telecoms provider with an experienced team who are dedicated to ensuring our clients business systems are protected.

Paramount Defenses

Paramount Defenses

Paramount Defenses have unrivaled capability in two of the most critical areas in cyber security today – Active Directory Security and Privileged Access.

Network Coverage

Network Coverage

Network Coverage align, maintain, and integrate technology and cloud solutions with business operations to improve productivity and security with as few issues and disruptions as possible.