This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security teams and hiring managers can use social media screening to identify potential security threats, but they must be cautious to remain compliant.
The Russian government has blocked Facebook and restricted content on Twitter amid its ongoing invasion of Ukraine. VPN services have risen in adoption since the ban.
In a hearing by the House Intelligence Committee, John Cohen, Head of the Department of Homeland Security (DHS) Office of Intelligence and Analysis explained steps that DHS has taken to prevent domestic terrorism and violence since the U.S. Capitol building was breached by rioters on January 6, 2021.
The response to dis- and misinformation will likely become a critical function for security leaders and risk managers across an enterprise. Find out how disinformation is impacting risk management within organizations and how you can mitigate the risk.
Social media campaigns designed to spread false information about companies is a growing issue and will soon be a top-level concern for security professionals and executives in every industry. With misinformation on the rise, here are a few things CSOs and their teams can start doing today to prepare.
Using memes as propaganda, employing sophisticated communication networks for both planning and recruiting, making use of both fringe and private online forums and organizing militias to inspire lone wolf actors for violent action have proven to become tried-and-true tactics by extremist online communities seeking to expand their influence in recent years.
According to the Network Contagion Research Institute (NCRI) report, presented by the Rutgers Miller Center for Community Protection and Resilience, Network-Enabled Anarchy: How Militant Anarcho-Socialist Networks Use Social Media to Spread Violence Against Political Opponents and Law Enforcement, militant and extremist groups have taken to social media and online forums to plant hateful, anti-Semitic and/or revolutionary ideas in the public eye, which are often disguised with humor or through using coded language.
What happens online sometimes manifests as a real-world threat. Real-world threats are typically planned, referenced or originated online. Understanding the convergence between online behavior and real-world actions is increasingly important in the corporate security field. Here’s how security professionals can think about identifying and understanding threats in a society that increasingly straddles the virtual and physical worlds.
The CST January-June 2019 Antisemitic Incidents Report shows a record high total of 892 antisemitic incidents in the UK in the first six months of 2019.
In an era defined by instantaneous social sharing, unprecedented transparency and 24/7 news coverage, Chief Security Officers (CSOs) find themselves with a new job: communications.
Today’s security teams have much less time to control the narrative. CSOs are expected to know key details immediately and prepare responses more rapidly. And responses often include talking points, which means coordinating with corporate communications, PR, marketing and others.
Facebook, Twitter, Instagram, YikYak, Weibo…. There are dozens, if not hundreds, of different social media platforms on the market today, and maintaining a grasp of your enterprise’s reputation and any potential risks in your area can be a challenge.
Get our new eMagazine delivered to your inbox every month.
Stay in the know on the latest enterprise risk and security industry trends.