TECHNOLOGY > Key Areas > Social Media


« Back to News

2016-09-13

Facebook, Twitter and Google Are A 'recruiting platform for terrorism''

The Social Network: Facebook, Twitter & Google are deliberately failing to stop terrorists using their websites to promote terror say British MPs.

2016-08-31

Psychological Warfare On Social Media

Twittersphere: Cyberwar between India and Kashmiri insurgents is hotting up with a big PsyOps element, focused on social media.

2016-08-16

What Executives Really Should Know About Social Media

Executive social media accounts are the first places many malicious attackers go when gathering target intelligence.

2016-07-27

US Defense Intelligence Agency Is Researching Employee Social Media Histories

The Pentagon is researching a "social media checks" pilot scheme that would analyze public posts to help determine an employee's suitability.

2016-07-18

The Global War of Narratives and the Role of Social Media

The unique characteristic of social media is that it empowers and enables individuals to engage in ways previously unseen. Opinion by Anja Kaspersen.

2016-06-21

Twitter Blocks Data Access By US Spy Agencies

Twitter has banned US intelligence agencies from using it's Dataminr alert service.

2016-06-19

Iran Wants To Collect All Social Network Data

The Iranian government wants tighter controls on all foreign messaging and social media apps operating in the country.

2016-06-14

North Korea’s Psychological Cyberwar Against Its Neighbour

Zombie DDOS attacks, targeted email propaganda and planting fake news videos are all parts of a coordinated campaign against South Korea.

2016-06-13

First LinkedIn, Now Twitter ... Hacked User IDs For Sale

Hackers may have used malware to collect more than 32 million Twitter login credentials that are now being sold on the dark web.

2016-04-27

The CIA Invests In Firms That Mine Social Media

Soft robots that can grasp delicate objects, computer algorithms designed to spot an “insider threat,” and artificial intelligence sifting large data sets.

2016-03-11

UK: Twitter To Train Prosecutors To Fight Online Abuse

The Internet is increasingly used as a weapon by perpetrators of domestic abuse, rape and sexual violence against women.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CloudEndure

CloudEndure

CloudEndure offers Disaster Recovery and Continuous Replication for the Cloud.

Titus

Titus

Titus is a global leader in enterprise-grade data protection solutions.

K&D Insurance Brokers

K&D Insurance Brokers

K&D provide insurance for all sectors of industry and commerce including cyber risk cover.

Belkasoft

Belkasoft

Belkasoft is a software vendor providing public agencies, corporate security teams, and private investigators with digital forensic solutions.

National Forensic Sciences University (NFSU) - India

National Forensic Sciences University (NFSU) - India

National Forensic Sciences University is the world’s first and only University dedicated to Digital Forensic and allied Sciences.

Cyber Security Courses

Cyber Security Courses

Cyber Security Courses was formed to help students in the UK find cyber security courses online.

Pelion

Pelion

Pelion Connected Device Services are the easiest way to securely connect and manage your devices, allowing you to focus on forging your future.

Orbus Software

Orbus Software

Orbus develops, markets and sells enterprise software which helps large, blue chip and government organisations across the globe to achieve digital transformation outcomes.

IN4 Group

IN4 Group

IN4 Group is a skills, innovation and start-up services provider that specialises in supporting businesses with the training, communities, networks and advice they need to scale.

Bitdefender

Bitdefender

Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide.

Eurotech

Eurotech

Eurotech provides Edge Computers and IoT solutions. We help to connect your assets and make them smarter through secure and agnostic hardware and software technologies.

ABM Technology Group

ABM Technology Group

ABM Technology Group (formerly True IT) provide business information technology services, solutions, and consulting for small to mid-sized organizations.

X-Analytics

X-Analytics

X-Analytics is a cyber risk analytics application to create a better way for organizations to understand and manage cyber risk.

Security Awareness Special Interest Group (SASIG)

Security Awareness Special Interest Group (SASIG)

The Security Awareness Special Interest Group (SASIG) addresses the human aspects of security and fraud prevention in an initiative to improve trust and confidence in the online environment.

Hacker School

Hacker School

Hacker School offers technology motivated training programs that provide Cyber Security Certifications and Courses.

Conifers.ai

Conifers.ai

Empower your existing SecOps team with the strength of AI - achieve SOC excellence with Conifers CognitiveSOC.