TECHNOLOGY > Key Areas > Social Media


« Back to News

2018-07-31

Facebook & Fake News

Critics claim that Facebook simply isn’t willing to make the hard choices necessary to tackle fake news.

2018-07-13

Fake News Is A Real Cybesecurity Risk

The viral nature of fake news does more than spread misinformation, it presents extensive cybersecurity risks that are not making the news.

2018-07-12

Fake Dating Apps Infiltrate Israeli Military

Hamas has a sophisticated spyware operation designed to trick Israeli Defense Force soldiers into downloading malicious apps.

2018-07-11

ICO Fine Facebook Half A Million Pounds

Facebook is to be fined £500,000 by the British ICO regulator, the maximum amount possible, for its part in the Cambridge Analytica scandal.

2018-06-25

Using Machine Learning To Spot Photoshopped Images

Adobe is using machine learning to make it easier to spot Photoshopped images. New research uses AI to automate traditional digital forensics.

2018-06-18

Facebook’s Head Of Policy Quits Amid Data Misuse Controversey

Facebook's Elliot Schrage is stepping down after a decade at the company, a rare departure among the senior ranks at the social network.

2018-06-12

Facebook Admits Privacy Settings 'Bug' Affects 14 Million Users

Bad To Worse: Forget about giving user data away to dodgy business partners, it looks like Facebook can't protect your privacy even when it wants to.

2018-06-08

Backlash: Facebook's Data-Sharing With Chinese Firms

Facebook draws further criticism from US legislators who are angry to learn about data sharing with suspectedly hostile Chinese firms.

2018-06-07

Facebook Gave Chinese Tech Firms Access To User Data

Facebook shares its user data with several Chinese tech firms, including Huawei and Lenovo, both suspected as risks to US national security.

2018-06-01

Countering Electoral Interference

Russia’s campaign targeting the 2016 US election shows the how deeply democratic processes can be undermined using communications technology.

2018-05-28

Spies Hack Journalism

A Leak. A Whistelblower. A Spy. In a world in which foreign intelligence services hack, leak and fabricate, journalists have to use extreme caution.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Montash

Montash

Montash is an award winning, global technology recruitment business, specialising in the acquisitions of high-performing talent across a number of core disciplines including Information Security.

Aqua Security Software

Aqua Security Software

Aqua Security helps enterprises secure their cloud native applications from development to production, whether they run using containers, serverless, or virtual machines.

Networkers

Networkers

Networkers is a global recruitment consultancy helping unite job-seekers and hiring companies across the technology industry.

CyberPoint

CyberPoint

CyberPoint delivers innovative, leading-edge cyber security products, solutions, and services to customers worldwide.

Secude

Secude

SECUDE is an established global security solutions provider offering innovative data protection for SAP users.

DataCloak

DataCloak

DataCloak is an innovation company that focus on providing enterprise data-in-motion security solutions based on zero-trust security technology.

Sonrai Security

Sonrai Security

Sonrai Security delivers an enterprise security platform focused on identity and data protection inside AWS, Azure, and Google Cloud.

Blackpoint Cyber

Blackpoint Cyber

Blackpoint’s mission is to provide effective, affordable real-time threat detection and response to organizations of all sizes around the world.

Sertainty

Sertainty

Sertainty enables developers to mix intelligence into data files for active risk mitigation and data control. Discover the impact of Data: Empowered.

Britive

Britive

The Britive Platform is a cloud-native security solution built for the most demanding cloud-forward enterprises.

Help AG

Help AG

Help AG provides leading enterprise businesses and governments across the Middle East with strategic consultancy combined with tailored information security solutions and services.

Trusted Technologies and Solutions (TTS)

Trusted Technologies and Solutions (TTS)

TTS is a security consulting company specialised on business continuity and crisis management, information security management, information risk management and identity and access management.

Ciphertex Data Security

Ciphertex Data Security

Ciphertex is a leading data security company that specializes in portable data encryption and privacy protection storage systems.

Iconium Software

Iconium Software

DataLenz by Iconium offers continuous and real-time tracking of your data assets delivering you the tools you need to successfully reach and maintain your target security standards.

Kriptos

Kriptos

Kriptos helps businesses improve their cybersecurity, risk, and compliance strategies by locating critical information through a technology that automatically classifies and labels documents using AI.

Software Improvement Group (SIG)

Software Improvement Group (SIG)

Software Improvement Group helps business and technology leaders drive their organizational objectives by fundamentally improving the health and security of their software applications.