TECHNOLOGY > Key Areas > Social Media


« Back to News

2018-11-05

Social Media Companies Scan For Potential Terrorists

The big social media platforms have developed technological and policy-based ways to help identify and prevent extremist content.

2018-11-03

Younger Generation Better At Separating News From Opinion

Gen Z don’t know much about the days of print newspapers separating the news pages from the opinion section. But they can tell the difference.

2018-10-30

Facebook Sued Over Video Viewing Figures

In the dash for business growth Facebook miscounted audiences. Now, advertisers are suing them for unfair business conduct and fraud.

2018-10-26

Facebook Wants To Buy A Cybersecurity Firm. Which One?

Facebook quickly wants to get its hands on security tools that will easily integrate with its current services and has a big acquisition in mind.

2018-10-23

A Genocide Incited On Facebook

Myanmar military personnel turned the social network into a tool for ethnic cleansing hidden behind fake names and sham accounts.

2018-10-16

New Google App Fights Censorship

A new Google app has recently been launched aimed at protecting users from state-sponsored censorship.

2018-10-12

New Tools To Fight Fake News

Many sites that generate fake news share characteristics that distinguish them from genuine journalistic outlets.

2018-10-08

Google Is Building A Search Engine For Fact Checks

Google News Initiative has launched the beta version of a tool that’s specifically for fact-checking content to counter fake news.

2018-10-10

California Bans 'Secret' Election Bots

California has adopted legislation which bans the use of undeclared bots during elections.

2018-10-08

Massive Facebook Hack Exploited Critical Bugs

Hackers exploited a vulnerability related to the “View As” feature to steal access tokens that could have been used to hijack accounts.

2018-10-08

The Weaponization Of Social Media

Reading List: P. W. Singer and Emerson Brooking tackle the mind bending questions that arise when war goes online and the online world goes to war.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ACIS Professional Center

ACIS Professional Center

ACIS provides training and consulting services in the area of information technology, cybersecurity, IT Governance, IT Service management, information security and business continuity management.

Kualitatem

Kualitatem

Kualitatem Inc. is an independent software testing and information systems auditing company

HyTrust

HyTrust

HyTrust specialises in security, compliance and control software for virtualization and cloud environments.

Napatech

Napatech

Napatech develops and manufactures high speed network accelerators specifically designed for real-time network monitoring and analysis applications.

Critical Infrastructures for Information and Cybersecurity (ICIC)

Critical Infrastructures for Information and Cybersecurity (ICIC)

ICIC addresses the demand for cybersecurity for National Public Sector organizations and civil and private sector organizations in Argentina.

RiskIQ

RiskIQ

RiskIQ is the leader in digital threat management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organization’s digital presence.

Bottomline Technologies

Bottomline Technologies

Bottomline Technologies is an innovator in business payment automation technology, helping companies make complex business payments simple, smart and secure.

SaferVPN

SaferVPN

SaferVPN is a Virtual Private Network services provider offering secure encrypted access to the internet.

Arab Information & Communication Technologies Organization (AICTO)

Arab Information & Communication Technologies Organization (AICTO)

The Arab ICT Organization (AICTO) is an Arab governmental organization working under the aegis of the league of Arab States.

Gradiant

Gradiant

Gradiant’s mission is to contribute to the growth and competitive improvement of Galician businesses through technology development and innovation using ICT.

Cybersecure Policy Exchange (CPX)

Cybersecure Policy Exchange (CPX)

Cybersecure Policy Exchange is a new initiative dedicated to advancing effective and innovative public policy in cybersecurity and digital privacy.

Data Protection Commission (DPC) - Ireland

Data Protection Commission (DPC) - Ireland

The Data Protection Commission (DPC) is the national independent authority responsible for upholding the fundamental right of individuals in the EU to have their personal data protected.

Klaatu IT Security (KITS)

Klaatu IT Security (KITS)

Klaatu IT Security is a boutique provider of cyber security services, empowering our clients to prioritise and reduce their cyber risk.

Onwardly

Onwardly

For everyday folks tasked with implementing security and privacy. Do it faster with Onwardly - build, launch and scale your cyber resilience program in 30 minutes per week.

Myrror Security

Myrror Security

Myrror Security is a software supply chain security solution that aids lean security teams in safeguarding their software against breaches.

Softcell Technologies Global

Softcell Technologies Global

Softcell is one of India's leading System Integrators. We serve enterprise customers in the areas of IT Security, Mobility, Optimised IT Infrastructure, Cloud and Engineering Services.