Social-media security News
June 06, 2017
Those who stand in the way of cleaning up the Internet by claiming to defend freedom of speach and secure encryption do their cause no good.
May 10, 2016
Twitter ordered its business partner Dataminr to cut off the Twitter firehose feed access for U.S. intelligence agencies, but experts expect the NSA won't miss much.
November 02, 2015
Despite brand recognition, familiarity and big customer wins, Facebook's business offering faces hurdles in the enterprise social networking market.
March 27, 2015
As more data moves online, social engineering techniques are becoming increasingly advanced and traditional training methods may not be enough to keep enterprises safe.
Social-media security Get Started
Bring yourself up to speed with our introductory content
CISOs need to follow certain enterprise social media best practices if they want to safely maintain public profiles. Expert Mike O. Villegas has ten best practices for social media. Continue Reading
Brandjacking is an act that allows an individual or company to assume or exploit a brand's identity to undermine that brand. Continue Reading
The following is an excerpt from chapter 6 Gary Bahadur from the book Securing the clicks: Network security in the age of social media. Continue Reading
Evaluate Social-media security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Enterprise social media has revolutionized how businesses communicate with consumers. However, it has also made brand hacking an even larger concern. Continue Reading
Increasingly sophisticated malware can divert the attention of IT departments from low-level security gaps. Here’s why you need a strategy that works on all levels. Continue Reading
Information security policies are vital tools for midmarket companies facing mobile device management concerns, cloud computing migrations and social media usage issues. Learn which factors to consider when setting an IT security policy in this Midmarket CIO Briefing. Continue Reading
Problem Solve Social-media security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A social media security policy is necessary for most enterprises today. Expert Mike O. Villegas discusses what should be included in social media policies. Continue Reading
A Linux-based Moose worm causes social media fraud through infected routers. Expert Nick Lewis explains how the Moose worm works and how to avoid it. Continue Reading
Did you know a secure Web gateway can combat Web security issues such as malware, unapproved application use and social media threats? Continue Reading