Social media security risks and real-time communication security News
October 20, 2015
It's important for online users to understand social media risks and the caution they should use when sharing personal information online.
July 07, 2015
Web monitoring software can block use of Facebook and HBO at work, but also raises privacy concerns.
March 23, 2015
Cisco says a vulnerability in some of its IP phones for SMBs could allow eavesdropping. A fix is not yet available, but Cisco has offered mitigation techniques.
March 10, 2015
The mobile payment app maker responds to criticism by stepping up security with better verifications and notifications for email and phone number changes.
Social media security risks and real-time communication security Get Started
Bring yourself up to speed with our introductory content
CISOs need to follow certain enterprise social media best practices if they want to safely maintain public profiles. Expert Mike O. Villegas has ten best practices for social media. Continue Reading
A new app for end-to-end encrypted messaging and file sharing is available, but is it ready for enterprise use? Expert Michael Cobb explains. Continue Reading
In this excerpt of Social Engineering Penetration Testing, the authors outline what phishing attacks are and outline how these attacks work using multiple real-world examples. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Social media security risks and real-time communication security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Microsoft's Windows 10 Wi-Fi Sense was designed to make hotspot sharing easy, but experts debate if the security risks are real and whether the new feature offers substantial benefits and relative safety. Continue Reading
Facebook added OpenPGP encryption to its messaging services to help improve messaging safety. Expert Michael Cobb explains the benefits of the approach. Continue Reading
Mobile devices are coming enabled for VoLTE for voice and video calling, but what are the risks? Network security expert Kevin Beaver explains. Continue Reading
Manage Social media security risks and real-time communication security
Learn to apply best practices and optimize your operations.
In this excerpt of Securing VoIP: Keeping your VoIP Network Safe, author Regis (Bud) Bates outlines different approaches to VoIP security and offers best practices to ensure infrastructure security is intact. Continue Reading
Social media compliance incidents in financial institutions are on the rise. Here are the most common violations and how to avoid them in the future. Continue Reading
Repackaged applications can present multiple enterprise security risks. Expert Nick Lewis explains what these fake apps are and how to defend against them. Continue Reading
Problem Solve Social media security risks and real-time communication security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A Linux-based Moose worm causes social media fraud through infected routers. Expert Nick Lewis explains how the Moose worm works and how to avoid it. Continue Reading
Recently revealed insecurities in SS7 have left many unsure about the well-used protocol needed for phone connections. However, the answer to achieving security is not easily obtained. Continue Reading
Expert Nick Lewis explores the latest spam defense methods and products that will help enterprises defend against new and emerging spam techniques. Continue Reading