New & Notable
Social media security risks and real-time communication security News
September 19, 2014
News roundup: Rogue cell phone towers are popping up across the United States, heightening enterprise communication and data privacy concerns. Plus: Goodwill breach update; Adobe patches released; and security in 2025.
September 27, 2013
As enterprises try to turn toward more proactive defense measures, open source intelligence could prove to be a valuable tool, an expert panel said.
April 24, 2013
The attack seeks to compromise a Twitter webpage via a man-in-the-browser attack. Trusteer warns it could be a harbinger of broader future attacks.
June 21, 2012
Hacktivist group UGNazi says it caused multiple Twitter outages Thursday. Update: Twitter says a "cascading bug" was to blame.
Social media security risks and real-time communication security Get Started
Bring yourself up to speed with our introductory content
Social login is a single sign-on (SSO) that allows users to authenticate themselves on various applications and sites by connecting through a social networking site rather than typing a separate ID and password on each website. The sites most ... Continue Reading
A Facebook scam is a post or page on the popular social networking site designed to deceive users and spread rapidly through their personal networks. Scams are sometimes created for identity theft or to spread malware but the usual purpose is ... Continue Reading
The following is an excerpt from chapter 6 Gary Bahadur from the book Securing the clicks: Network security in the age of social media. Continue Reading
Evaluate Social media security risks and real-time communication security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Enterprise social media has revolutionized how businesses communicate with consumers. However, it has also made brand hacking an even larger concern. Continue Reading
Nick Hayes of Forrester Research details social media regulations and compliance issues, including five compliance areas that enterprises must manage. Continue Reading
Security can't slow down the Twitter phenomenon, but it can take steps to prevent data leakage. Continue Reading
Product ReviewsPowered by IT Central Station
Centerbeam's security options for good data security 1. closed API's 2.Integration tied to customer environment and ActiPowered by IT Central Station
Use Of Solution: I have used it once now for over 6 months. Valuable Features: The access of your whole group of data and the functionality of...Continue Reading
Powered by IT Central Station
A good choice if you are a .Net, Java SaaS provider looking for a Security as a Service solution. Their services take you through application...Continue Reading
Powered by IT Central Station
v2 Review: Premature product - not a proper product to be used for PCI approved web scanning Having done numerous penetration tests using...Continue Reading
Manage Social media security risks and real-time communication security
Learn to apply best practices and optimize your operations.
Social media compliance is not typically considered a big issue for companies, but expert Mike Chapple explains why it should be. Continue Reading
The amount of malware using peer-to-peer communications has increased dramatically. Enterprise threats expert Nick Lewis explains how to detect P2P malware. Continue Reading
Expert Joseph Granneman explains the best way for employers to approach social media monitoring as part of a social media policy for employees. Continue Reading
Problem Solve Social media security risks and real-time communication security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Amid recent man-in-the-browser attacks aimed at Twitter, expert Nick Lewis explains how enterprises can best secure business Twitter accounts. Continue Reading
Expert Michael Cobb explains the security risks of instant messaging (IM) and reveals why standardizing on one program can help mitigate them. Continue Reading
Expert Nick Lewis provides advice for enterprises looking to take inspiration for an incident response plan from Facebook's red team exercises. Continue Reading