TECHNOLOGY > Key Areas > Social Media


« Back to News

2021-08-18

The Taliban's Mastery Of Information Warfare

The Taliban have used modern information warfare techniques, combining fake accounts and bots, to successfully undermine the Afghan government.

2021-11-12

Cyber Operations In Wartime

Policymakers and military leaders need to broaden their assumptions about how state and non-state actors will use cyber operations in future conflicts.

2021-08-09

Looking For Love May Have Unexpected Consequences

Warning: Be cautious when using dating platforms as evidence reveals criminals have successfully conned over £15 million from unsuspecting lovers.

2021-07-30

Twitter Celebrity Hack Suspect Arrested

Hackers took control of public figures' accounts to send a series of tweets asking followers to transfer crypto currency to a specific Bitcoin wallet.

2021-07-27

Was There A Russian Plot To Put Trump In The White House?

An unprecedented leaked document from Moscow suggests that Vladimir Putin launched a secret multi-agency effort to get Trump elected in 2016.

2021-07-19

Scientists Say Social Media Is A Risk To Humanity

Social media has completely changed the way we communicate and the collective behavioral effects of new technology on humans can be destructive.

2021-07-05

Data Dominance: EU Investigates Google

The investigation will examine Google's role in collecting data, selling advertising space and acting as an online-advertising intermediary.

2021-06-25

Social Media’s Effects On Mental Health

Life Online: While social media has its benefits, it’s important to remember that it can never be a replacement for real-world human connection.

2021-06-21

US Legislators Take Aim At Big Tech Companies

Antitrust Reform: US lawmakers have introduced five separate bills aimed at limiting the power held by the five 'Big Tech' companies.

2021-06-08

Criminal Messaging App Leads To Widespread Arrests

Operation Trojan Shield: 800 suspected criminals arrested, 8 tons of cocaine and $48m seized in a Police sting using a fake secure messaging app.

2021-05-17

British Law To Protect Online Users

Social media firms will have to remove harmful content quickly or potentially face multi-billion-pound fines under new British legislation.

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Privacy Professor

Privacy Professor

Privacy Professor provides information privacy, security and compliance services, tools and products to organizations in a wide range of industries.

Council on Foreign Relations (CFR)

Council on Foreign Relations (CFR)

CFR is dedicated to better understanding the world and the foreign policy choices facing the USA and other countries. Cyber security is covered within the CFR topic areas.

Windstream Enterprise

Windstream Enterprise

Windstream Enterprise offer a range of innovative network, communications and collaboration solutions optimized and secured for a cloud centric, anytime/anywhere world.

CYBERPOL

CYBERPOL

CYBERPOL's mission is to facilitate the widest possible mutual assistance between all cyber crime law enforcement authorities to help mitigate global cyber threats.

Cisco Talos

Cisco Talos

Talos is an industry-leading threat intelligence solution that protects your organization’s people, data and infrastructure from active adversaries.

NetMonastery DNIF

NetMonastery DNIF

NetMonastery is a network security company which assists enterprises in securing their network and applications by detecting threats in real time.

FedRAMP

FedRAMP

FedRAMP, is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.

SparkCognition

SparkCognition

SparkCognition’s AI-powered solutions enhance cybersecurity, identify and prevent equipment failures before they happen, and provide prescriptive intelligence for maintaining your most critical assets

HackHunter

HackHunter

HackHunter’s passive sensor network continuously monitors, detects and alerts when a malicious WiFi network and/or hacking behaviour is identified.

Secured Communications

Secured Communications

Secured Communications has developed the only unified secure communications platform trusted by public safety and counter terrorism professionals around the world.

MCPc

MCPc

MCPc improves the security and well-being of our clients. We protect data, manage the complexity and sustainability of technology, empower employee performance, and ultimately reduce business risk.

Sovrin Foundation

Sovrin Foundation

The Sovrin Foundation is a private-sector, international non-profit that was established to govern the world's first self-sovereign identity (SSI) network.

AgileBlue (Agile1)

AgileBlue (Agile1)

AgileBlue (formerly Agile1) is a managed breach detection company with an Autonomous SOC-as-a-Service for 24×7 monitoring, detection and guided response.

Inflection Point Ventures (IPV)

Inflection Point Ventures (IPV)

Inflection Point Ventures (IPV) is a 6000+ members angel investing firm which supports new-age entrepreneurs by connecting them with a diverse group of investors.

Lumifi

Lumifi

Lumifi provide end-to-end cybersecurity resilience solutions with a specialty in managed detection and response (MDR) services.

OX Security

OX Security

OX is a DevOps software supply chain security solution. Teams can verify the integrity and security of every artifact using a pipeline bill of materials (PBOM).