New & Notable
Social media security risks and real-time communication security News
September 27, 2013
As enterprises try to turn toward more proactive defense measures, open source intelligence could prove to be a valuable tool, an expert panel said.
April 24, 2013
The attack seeks to compromise a Twitter webpage via a man-in-the-browser attack. Trusteer warns it could be a harbinger of broader future attacks.
June 21, 2012
Hacktivist group UGNazi says it caused multiple Twitter outages Thursday. Update: Twitter says a "cascading bug" was to blame.
June 06, 2012
More than 6 million passwords may have been stolen from the servers of social network LinkedIn and posted to a Russian hacking forum.
Social media security risks and real-time communication security Get Started
Bring yourself up to speed with our introductory content
A Facebook scam is a post or page on the popular social networking site designed to deceive users and spread rapidly through their personal networks. Scams are sometimes created for identity theft or to spread malware but the usual purpose is ... Continue Reading
The following is an excerpt from chapter 6 Gary Bahadur from the book Securing the clicks: Network security in the age of social media. Continue Reading
Greynet is a term for the use of unauthorized applications on a corporate network. A greynet application is a network-based program that corporate network users download and install without permission from their company's IT department. Continue Reading
Evaluate Social media security risks and real-time communication security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Enterprise social media has revolutionized how businesses communicate with consumers. However, it has also made brand hacking an even larger concern. Continue Reading
Nick Hayes of Forrester Research details social media regulations and compliance issues, including five compliance areas that enterprises must manage. Continue Reading
Security can't slow down the Twitter phenomenon, but it can take steps to prevent data leakage. Continue Reading
Manage Social media security risks and real-time communication security
Learn to apply best practices and optimize your operations.
The amount of malware using peer-to-peer communications has increased dramatically. Enterprise threats expert Nick Lewis explains how to detect P2P malware. Continue Reading
Expert Joseph Granneman explains the best way for employers to approach social media monitoring as part of a social media policy for employees. Continue Reading
Amid recent man-in-the-browser attacks aimed at Twitter, expert Nick Lewis explains how enterprises can best secure business Twitter accounts. Continue Reading
Problem Solve Social media security risks and real-time communication security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Expert Michael Cobb explains the security risks of instant messaging (IM) and reveals why standardizing on one program can help mitigate them. Continue Reading
Expert Nick Lewis provides advice for enterprises looking to take inspiration for an incident response plan from Facebook's red team exercises. Continue Reading
Two-factor authentication vulnerabilities are a real concern, but should they deter enterprises from deploying 2FA? Expert Michael Cobb discusses. Continue Reading