thecyberexpress.com
Open in
urlscan Pro
2606:4700:20::681a:18a
Public Scan
Submitted URL: https://bit.ly/4aU6iKh
Effective URL: https://thecyberexpress.com/why-soft-skills-cybersecurity-superpower/?utm_campaign=Oktopost-2024-01+Advocate+Posts&utm_conte...
Submission: On January 15 via manual from US — Scanned from DE
Effective URL: https://thecyberexpress.com/why-soft-skills-cybersecurity-superpower/?utm_campaign=Oktopost-2024-01+Advocate+Posts&utm_conte...
Submission: On January 15 via manual from US — Scanned from DE
Form analysis
9 forms found in the DOMGET https://thecyberexpress.com/
<form action="https://thecyberexpress.com/" method="get" class="jeg_search_form" target="_top">
<input name="s" class="jeg_search_input" placeholder="Search..." type="text" value="" autocomplete="off">
<button aria-label="Search Button" type="submit" class="jeg_search_button btn"><i class="fa fa-search"></i></button>
</form>
GET https://thecyberexpress.com/
<form action="https://thecyberexpress.com/" method="get" class="jeg_search_form" target="_top">
<input name="s" class="jeg_search_input" placeholder="Search..." type="text" value="" autocomplete="off">
<button aria-label="Search Button" type="submit" class="jeg_search_button btn"><i class="fa fa-search"></i></button>
</form>
GET https://thecyberexpress.com/
<form action="https://thecyberexpress.com/" method="get" class="jeg_search_form" target="_top">
<input name="s" class="jeg_search_input" placeholder="Search..." type="text" value="" autocomplete="off">
<button aria-label="Search Button" type="submit" class="jeg_search_button btn"><i class="fa fa-search"></i></button>
</form>
POST https://thecyberexpress.com/wp-comments-post.php
<form action="https://thecyberexpress.com/wp-comments-post.php" method="post" id="commentform" class="comment-form">
<p class="comment-notes"><span id="email-notes">Your email address will not be published.</span> <span class="required-field-message">Required fields are marked <span class="required">*</span></span></p>
<p class="comment-form-comment"><label for="comment">Comment <span class="required">*</span></label> <textarea id="comment" name="comment" cols="45" rows="8" maxlength="65525" required="required"></textarea></p>
<p class="comment-form-author"><label for="author">Name <span class="required">*</span></label> <input id="author" name="author" type="text" value="" size="30" maxlength="245" autocomplete="name" required="required"></p>
<p class="comment-form-email"><label for="email">Email <span class="required">*</span></label> <input id="email" name="email" type="text" value="" size="30" maxlength="100" aria-describedby="email-notes" autocomplete="email" required="required">
</p>
<p class="comment-form-url"><label for="url">Website</label> <input id="url" name="url" type="text" value="" size="30" maxlength="200" autocomplete="url"></p>
<p class="comment-form-cookies-consent"><input id="wp-comment-cookies-consent" name="wp-comment-cookies-consent" type="checkbox" value="yes"> <label for="wp-comment-cookies-consent">Save my name, email, and website in this browser for the next time
I comment.</label></p>
<p class="comment-form-privacy_policy">
<label for="privacy_policy">Privacy Policy Agreement <span class="required">*</span></label>
<input id="privacy_policy" name="privacy_policy" required="required" type="checkbox"> I agree to the Terms & Conditions and <a href="https://thecyberexpress.com/privacy-statement/">Privacy Policy</a>.
</p>
<p class="comment-subscription-form"><input type="checkbox" name="subscribe_comments" id="subscribe_comments" value="subscribe" style="width: auto; -moz-appearance: checkbox; -webkit-appearance: checkbox;"> <label class="subscribe-label"
id="subscribe-label" for="subscribe_comments">Notify me of follow-up comments by email.</label></p>
<p class="comment-subscription-form"><input type="checkbox" name="subscribe_blog" id="subscribe_blog" value="subscribe" style="width: auto; -moz-appearance: checkbox; -webkit-appearance: checkbox;"> <label class="subscribe-label"
id="subscribe-blog-label" for="subscribe_blog">Notify me of new posts by email.</label></p>
<p class="form-submit"><input name="submit" type="submit" id="submit" class="submit" value="Post Comment"> <input type="hidden" name="comment_post_ID" value="53147" id="comment_post_ID">
<input type="hidden" name="comment_parent" id="comment_parent" value="0">
</p>
<p style="display: none;"><input type="hidden" id="akismet_comment_nonce" name="akismet_comment_nonce" value="ac0251eba9"></p>
<p style="display: none !important;"><label>Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_1" name="ak_js" value="1705335954733">
<script>
document.getElementById("ak_js_1").setAttribute("value", (new Date()).getTime());
</script>
</p>
</form>
GET https://thecyberexpress.com
<form action="https://thecyberexpress.com" method="get"><label class="screen-reader-text" for="cat">Categories</label><select name="cat" id="cat" class="postform" style="display: none;">
<option value="-1">Select Category</option>
<option class="level-0" value="54">Appointments</option>
<option class="level-0" value="55">Budgets</option>
<option class="level-0" value="680">Bug Bounty & Rewards</option>
<option class="level-0" value="50">Business News</option>
<option class="level-0" value="44">Compliance</option>
<option class="level-0" value="42">Cyber Essentials</option>
<option class="level-0" value="48">Cyber Warfare</option>
<option class="level-0" value="5677">Cybersecurity Awareness Month</option>
<option class="level-0" value="1">Cybersecurity News</option>
<option class="level-0" value="3089">Dark Web News</option>
<option class="level-0" value="41">Data Breach News</option>
<option class="level-0" value="3104">DDoS Attacks News</option>
<option class="level-0" value="6225">Deepfake</option>
<option class="level-0" value="49">Espionage</option>
<option class="level-0" value="47">Features</option>
<option class="level-0" value="39">Firewall Daily</option>
<option class="level-0" value="1599">Gitex2022</option>
<option class="level-0" value="45">Governance</option>
<option class="level-0" value="4159">Hacker Claims</option>
<option class="level-0" value="3078">Hacker News</option>
<option class="level-0" value="40">Hacking News</option>
<option class="level-0" value="2026">How to</option>
<option class="level-0" value="62">Interviews</option>
<option class="level-0" value="57">Learning & Development</option>
<option class="level-0" value="3953">Lockbit Ransomware News</option>
<option class="level-0" value="265">Main Story</option>
<option class="level-0" value="3077">Malware News</option>
<option class="level-0" value="61">Market Reports</option>
<option class="level-0" value="52">Mergers & Aquisitions</option>
<option class="level-0" value="53">Partnerships</option>
<option class="level-0" value="63">Podcast</option>
<option class="level-0" value="46">Policy Updates</option>
<option class="level-0" value="1087">Press Release</option>
<option class="level-0" value="71">Ransomware News</option>
<option class="level-0" value="43">Regulations</option>
<option class="level-0" value="58">Research</option>
<option class="level-0" value="3094">Resources</option>
<option class="level-0" value="60">Sponsored Content</option>
<option class="level-0" value="51">Startups</option>
<option class="level-0" value="4388">Threat Intelligence</option>
<option class="level-0" value="4376">Threat Intelligence News</option>
<option class="level-0" value="70">Vulnerabilities</option>
<option class="level-0" value="3079">Vulnerability News</option>
<option class="level-0" value="59">Whitepapers</option>
<option class="level-0" value="56">Workforce</option>
</select>
<div class="chosen-container chosen-container-single" title="" id="cat_chosen" style="width: 345px;"><a class="chosen-single">
<span>Select Category</span>
<div><b></b></div>
</a>
<div class="chosen-drop">
<div class="chosen-search">
<input class="chosen-search-input" type="text" autocomplete="off">
</div>
<ul class="chosen-results"></ul>
</div>
</div>
</form>
GET https://thecyberexpress.com/
<form action="https://thecyberexpress.com/" method="get" class="jeg_search_form" target="_top">
<input name="s" class="jeg_search_input" placeholder="Search..." type="text" value="" autocomplete="off">
<button aria-label="Search Button" type="submit" class="jeg_search_button btn"><i class="fa fa-search"></i></button>
</form>
POST #
<form action="#" data-type="login" method="post" accept-charset="utf-8">
<h3>Welcome Back!</h3>
<p>Login to your account below</p>
<div class="form-message"></div>
<p class="input_field">
<input type="text" name="username" placeholder="Username" value="">
</p>
<p class="input_field">
<input type="password" name="password" placeholder="Password" value="">
</p>
<p class="input_field remember_me">
<input type="checkbox" id="remember_me" name="remember_me" value="true">
<label for="remember_me">Remember Me</label>
</p>
<p class="submit">
<input type="hidden" name="action" value="login_handler">
<input type="hidden" name="jnews_nonce" value="d854b28fbb">
<input type="submit" name="jeg_login_button" class="button" value="Log In" data-process="Processing . . ." data-string="Log In">
</p>
<div class="bottom_links clearfix">
<a href="#jeg_forgotform" class="jeg_popuplink forgot">Forgotten Password?</a>
</div>
</form>
POST #
<form action="#" data-type="forgot" method="post" accept-charset="utf-8">
<h3>Retrieve your password</h3>
<p>Please enter your username or email address to reset your password.</p>
<div class="form-message"></div>
<p class="input_field">
<input type="text" name="user_login" placeholder="Your email or username" value="">
</p>
<div class="g-recaptcha" data-sitekey=""></div>
<p class="submit">
<input type="hidden" name="action" value="forget_password_handler">
<input type="hidden" name="jnews_nonce" value="d854b28fbb">
<input type="submit" name="jeg_login_button" class="button" value="Reset Password" data-process="Processing . . ." data-string="Reset Password">
</p>
<div class="bottom_links clearfix">
<a href="#jeg_loginform" class="jeg_popuplink"><i class="fa fa-lock"></i> Log In</a>
</div>
</form>
POST #
<form action="#" method="post" accept-charset="utf-8">
<h3>Add New Playlist</h3>
<div class="form-message"></div>
<div class="form-group">
<p class="input_field">
<input type="text" name="title" placeholder="Playlist Name" value="">
</p>
<p class="input_field">
<select name="visibility">
<option disabled="" selected="selected" value="">- Select Visibility -</option>
<option value="public">Public</option>
<option value="private">Private</option>
</select>
</p>
<div class="submit">
<input type="hidden" name="type" value="create_playlist">
<input type="hidden" name="action" value="playlist_handler">
<input type="hidden" name="post_id" value="">
<input type="hidden" name="jnews-playlist-nonce" value="993deb7e45">
<input type="submit" name="jeg_save_button" class="button" value="Save" data-process="Processing . . ." data-string="Save">
</div>
</div>
</form>
Text Content
#1 Trending Cybersecurity News & Magazine Monday, January 15, 2024 We are Hiring! * MagazineDownload * Firewall Daily * All * Bug Bounty & Rewards * Dark Web News * Data Breach News * Hacking News * Ransomware News * Vulnerabilities DATABASE SALE ON DARK WEB PUTS GEICO IN THE ATTACKERS CROSSHAIRS AGAIN TCE EXCLUSIVE: MCDONALD’S DATA BREACH 2024, A CONTINUATION OF CYBERSECURITY DILEMMAS TURA SCANDINAVIA AB ENCOUNTERS ANOTHER CYBERATTACK FOLLOWING INTRUSION IN DECEMBER NONAME TARGETS MULTIPLE WEBSITES IN LITHUANIA, BLAMES IT FOR AIDING UKRAINE NAVIGATING DIGITAL CHAOS: TAMING RISKS IN THE AGE OF GENERATIVE AI GACHA GAMES DECODED: CONTROVERSIES, PSYCHOLOGY, COPING BEYOND THE FIREWALL: WHY SOFT SKILLS ARE CYBERSECURITY’S NEW SUPERPOWER AI-DRIVEN CYBERSECURITY: TRANSFORMING DEFENSE STRATEGIES FOR THE DIGITAL AGE BEYOND CONVENIENCE: CAN YOU TRUST YOUR SMART HOME? TRENDING TAGS * blackbyte ransomware * Ransomware * lapsus$ ransomware * Apple * Apple vulnerability * Essentials * All * Compliance * Governance * Policy Updates * Regulations GREECE PLANS NATIONAL CYBERSECURITY AUTHORITY TO COMBAT RISING HACKER THREATS RETHINKING AI FOR CYBERSECURITY: THE UK & US REVEALS NEW GUIDELINES FOR AI SECURITY CYBER INSURANCE AND REAL-TIME THREAT DASHBOARD TO MEND THE GAPS IN NEAR FUTURE PLEDGE TO STOP RANSOM PAYMENT AWAITS CONSENSUS FROM ALL MEMBERS OF THE CRI BIDEN ADMINISTRATION’S AI DIRECTIVE: A BLUEPRINT FOR ETHICAL USE AND ENHANCED CYBERSECURITY TOWARDS CYBER RESILIENCE: A DATA-CENTRIC APPROACH TO SECURITY CYBLE PARTNER NETWORK GROWCON 2023: UNITING CYBERSECURITY LEADERS WHAT IS GRC (GOVERNANCE, RISK & COMPLIANCE): A BEGINNER’S GUIDE NEW YORK STATE EDUCATION DEPARTMENT BANS FACIAL RECOGNITION SCANS IN SCHOOLS * Regulations * Compliance * Governance * Policy Updates * Features * Cyber Warfare * Espionage * Workforce * Learning & Development * Business * All * Appointments * Budgets * Mergers & Aquisitions * Partnerships * Press Release * Startups 2024 OUTLOOK: EMERGING TRENDS SHAPING PHYSICAL SECURITY CYBLE’S LATEST PRODUCT – ODIN – ROLLS OUT SERVICE BANNER SEARCH FEATURE Y COMBINATOR SPOTLIGHTS AI-POWERED THREAT INTELLIGENCE PLATFORM CYBLE AMONG TOP STARTUPS WORLD CYBERCON INDIA 2023, SECOND EDITION: A TRIUMPH IN ADVOCATING A SECURE DIGITAL TERRAIN INSUREMO PARTNERS WITH CYBLE TO REVOLUTIONIZE CYBER INSURANCE WITH REAL-TIME THREAT INTELLIGENCE COUNTDOWN TO TIMEAI SUMMIT 2023: UNVEILING THE FUTURE OF ARTIFICIAL INTELLIGENCE IN DUBAI THE EMERGING TECH SUMMIT – SAUDI ARABIA 2023 PRIORITIZING BUSINESS CYBERSECURITY PLANS DURING MERGERS AND ACQUISITIONS TIMEAI SUMMIT IS UNITING TECH GIANTS AND VISIONARIES IN DUBAI TO SHAPE THE FUTURE OF AI * Startups * Mergers & Aquisitions * Partnerships * Appointments * Budgets * Research * Whitepapers * Sponsored Content * Market Reports * Interviews * Podcast * EventsCyberCon * World CyberCon 3rd Edition – META * World CyberCon India 2023 * Cyber Security Webinar * Endorsed Events * ProductsTools * Cyble Vision * Cyble Hawk (LEA, Govt.) * Am I Breached * Cyble Odin No Result View All Result * MagazineDownload * Firewall Daily * All * Bug Bounty & Rewards * Dark Web News * Data Breach News * Hacking News * Ransomware News * Vulnerabilities DATABASE SALE ON DARK WEB PUTS GEICO IN THE ATTACKERS CROSSHAIRS AGAIN TCE EXCLUSIVE: MCDONALD’S DATA BREACH 2024, A CONTINUATION OF CYBERSECURITY DILEMMAS TURA SCANDINAVIA AB ENCOUNTERS ANOTHER CYBERATTACK FOLLOWING INTRUSION IN DECEMBER NONAME TARGETS MULTIPLE WEBSITES IN LITHUANIA, BLAMES IT FOR AIDING UKRAINE NAVIGATING DIGITAL CHAOS: TAMING RISKS IN THE AGE OF GENERATIVE AI GACHA GAMES DECODED: CONTROVERSIES, PSYCHOLOGY, COPING BEYOND THE FIREWALL: WHY SOFT SKILLS ARE CYBERSECURITY’S NEW SUPERPOWER AI-DRIVEN CYBERSECURITY: TRANSFORMING DEFENSE STRATEGIES FOR THE DIGITAL AGE BEYOND CONVENIENCE: CAN YOU TRUST YOUR SMART HOME? TRENDING TAGS * blackbyte ransomware * Ransomware * lapsus$ ransomware * Apple * Apple vulnerability * Essentials * All * Compliance * Governance * Policy Updates * Regulations GREECE PLANS NATIONAL CYBERSECURITY AUTHORITY TO COMBAT RISING HACKER THREATS RETHINKING AI FOR CYBERSECURITY: THE UK & US REVEALS NEW GUIDELINES FOR AI SECURITY CYBER INSURANCE AND REAL-TIME THREAT DASHBOARD TO MEND THE GAPS IN NEAR FUTURE PLEDGE TO STOP RANSOM PAYMENT AWAITS CONSENSUS FROM ALL MEMBERS OF THE CRI BIDEN ADMINISTRATION’S AI DIRECTIVE: A BLUEPRINT FOR ETHICAL USE AND ENHANCED CYBERSECURITY TOWARDS CYBER RESILIENCE: A DATA-CENTRIC APPROACH TO SECURITY CYBLE PARTNER NETWORK GROWCON 2023: UNITING CYBERSECURITY LEADERS WHAT IS GRC (GOVERNANCE, RISK & COMPLIANCE): A BEGINNER’S GUIDE NEW YORK STATE EDUCATION DEPARTMENT BANS FACIAL RECOGNITION SCANS IN SCHOOLS * Regulations * Compliance * Governance * Policy Updates * Features * Cyber Warfare * Espionage * Workforce * Learning & Development * Business * All * Appointments * Budgets * Mergers & Aquisitions * Partnerships * Press Release * Startups 2024 OUTLOOK: EMERGING TRENDS SHAPING PHYSICAL SECURITY CYBLE’S LATEST PRODUCT – ODIN – ROLLS OUT SERVICE BANNER SEARCH FEATURE Y COMBINATOR SPOTLIGHTS AI-POWERED THREAT INTELLIGENCE PLATFORM CYBLE AMONG TOP STARTUPS WORLD CYBERCON INDIA 2023, SECOND EDITION: A TRIUMPH IN ADVOCATING A SECURE DIGITAL TERRAIN INSUREMO PARTNERS WITH CYBLE TO REVOLUTIONIZE CYBER INSURANCE WITH REAL-TIME THREAT INTELLIGENCE COUNTDOWN TO TIMEAI SUMMIT 2023: UNVEILING THE FUTURE OF ARTIFICIAL INTELLIGENCE IN DUBAI THE EMERGING TECH SUMMIT – SAUDI ARABIA 2023 PRIORITIZING BUSINESS CYBERSECURITY PLANS DURING MERGERS AND ACQUISITIONS TIMEAI SUMMIT IS UNITING TECH GIANTS AND VISIONARIES IN DUBAI TO SHAPE THE FUTURE OF AI * Startups * Mergers & Aquisitions * Partnerships * Appointments * Budgets * Research * Whitepapers * Sponsored Content * Market Reports * Interviews * Podcast * EventsCyberCon * World CyberCon 3rd Edition – META * World CyberCon India 2023 * Cyber Security Webinar * Endorsed Events * ProductsTools * Cyble Vision * Cyble Hawk (LEA, Govt.) * Am I Breached * Cyble Odin No Result View All Result No Result View All Result Home Features BEYOND THE FIREWALL: WHY SOFT SKILLS ARE CYBERSECURITY’S NEW SUPERPOWER TRANSLATING TECHNICAL JARGON INTO PLAIN LANGUAGE IS ESSENTIAL FOR INFORMING NON-TECHNICAL STAKEHOLDERS AND FACILITATING INFORMED DECISIONS. by Avantika Chopra January 13, 2024 in Features, Firewall Daily 0 615 SHARES 3.4k VIEWS Share on LinkedInShare on Twitter In a domain traditionally lauded for its technical prowess, the emergence of soft skills as a critical factor might seem counterintuitive. Yet, as cyber threats continue to evolve in sophistication, industry experts are acknowledging the indispensable role these skills play. Cybersecurity is no longer solely about firewalls and encryption. It’s a critical defense against sophisticated attacks that exploit human vulnerabilities. As technology intertwines more deeply with daily life, the interconnectedness of systems amplifies the impact of such attacks. YOU MIGHT ALSO LIKE ANONYMOUS COLLECTIVE LAUNCHES CYBERATTACK ON BAHRAIN OVER YEMEN AIRSTRIKES DATABASE SALE ON DARK WEB PUTS GEICO IN THE ATTACKERS CROSSHAIRS AGAIN TCE EXCLUSIVE: MCDONALD’S DATA BREACH 2024, A CONTINUATION OF CYBERSECURITY DILEMMAS Protecting against these threats demands a comprehensive approach that includes not only technical measures but also education, awareness, and the development of strong human-centric security practices. Let’s lay the groundwork with a simple hypothetical scenario. Adam, a cybersecurity analyst with impressive technical expertise, found a vulnerability in the company’s network infrastructure with the potential to expose sensitive client data if exploited. However, Adam struggled to streamline his technical findings into a non-technical format. His inability to convey the severity of the vulnerability to key decision-makers led to the dismissal of the issue as a routine technical glitch, assuming it could wait for a more convenient time to address. In the following weeks, the overlooked security flaw was exploited by a cyber adversary, resulting in a data breach that compromised sensitive customer information. The fallout was immediate and damaging loss of customer trust, legal repercussions, and a significant blow to the company’s reputation. A cybersecurity analyst, brilliant with code but lacking in communication skills, failed to effectively explain a critical security update to key decision-makers. His lack of effective communication and soft skills hindered his ability to convey the urgency of the situation, leading to dire consequences that could have been mitigated with clearer, more persuasive communication. While the above example might slightly overstate the situation, it does reflect a significant transformation in the cybersecurity sector. Although technical skills are indispensable for the protection of digital systems, they alone are increasingly inadequate to address the complexities of modern cyber threats. WHAT ARE SOFT SKILLS IN CYBERSECURITY? Soft skills, also known as interpersonal or people skills, encompass a collection of personal attributes and qualities that empower individuals to engage effectively in various personal and professional scenarios. Unlike technical or hard skills, which are specific to a particular job and often tied to one’s expertise in a particular domain, soft skills have gained increasing importance in cybersecurity. They work in tandem with technical proficiency to establish more robust defenses and responses to cyber threats. Field Chief Information Security Officer (CISO) for the Public Sector at Presidio, Dan Lohrmann, stressed to The Cyber Express the pivotal role of soft skills in cybersecurity. According to him, strong soft skills play a crucial role in facilitating effective teamwork and coordinated communication during emergency incidents. “In an emergency incident, strong soft skills enable a team to work together well and communicate in coordinated ways. You don’t want to be meeting someone in person for the first time during a major incident or misunderstand directions, expected actions, etc. Strong soft skills build trust and better outcomes,” stated Lohrmann. However, before diving into why soft skills are essential in cybersecurity it is essential to understand the key soft skills for cybersecurity professionals and what they are. COMMUNICATION SKILLS In cybersecurity, the ability to convey complex technical concepts in clear, understandable language is crucial. Professionals must translate jargon-heavy security information into layman’s terms for non-technical stakeholders, enabling informed decision-making and support. Communication is key, and this principle is equally important in cyberspace. The Equifax data breach in 2017, a significant event in cybersecurity history, highlights the critical importance of communication in cyberspace. This breach exposed the personal information of nearly 150 million Americans, primarily due to the failure to patch a known software vulnerability. Despite the availability of a patch, internal miscommunication and bureaucratic delays between IT and security teams led to its non-implementation. “Ability to communicate technical details in a clear and concise manner is a critical communication skill that should be innate. Comprehension of problem statements and addressing those for easily understandable solutions is important to team success,” Senior Research and Intelligence Manager at Cyble told The Cyber Express CRITICAL THINKING The capacity to analyze, evaluate, and solve complex problems or challenges by using logical and creative thinking. Critical thinking skills are vital for making informed decisions and adapting to various situations. Cybersecurity experts must possess acute critical thinking skills to recognize and analyze potential threats. This includes identifying subtle indicators of phishing attempts, assessing risk scenarios, and swiftly making informed decisions under pressure. Critical thinking allows professionals to anticipate vulnerabilities and proactively implement security measures to mitigate risks. PROBLEM-SOLVING The skill of identifying issues, evaluating possible solutions, and selecting the most appropriate course of action to resolve problems or overcome obstacles. Problem-solving skills can play a crucial role in resolving cybersecurity incidents efficiently. The cybersecurity space is dynamic and constantly evolving. Strong problem-solving skills enable professionals to adapt to emerging threats, devise innovative strategies, and respond effectively to security breaches. This involves thinking on one’s feet, creatively finding solutions, and implementing measures to contain and resolve incidents efficiently. Having individuals on the team who possess not only technical expertise but also the ability to extract valuable insights from past incidents and apply them to current situations is of great importance. It highlights that safeguarding the future is as crucial as defending against present threats. Cyble Senior Reseracher also highlighted the importance of Conflict Resolution Skills. “In a cybersecurity environment, conflicts may arise, the skill to mitigate the conflicts and come to a resolution is a skill that can be developed through experience and practice under good mentors in an organization,” he told The Cyber Express. ACTIVE LISTENING Lack of active listening can lead to ignoring critical feedback from team members, as seen in various incidents where employee concerns about security vulnerabilities were overlooked. Building trust and rapport with stakeholders—whether they’re clients, colleagues, or end-users—is facilitated through active listening. Understanding their concerns, challenges, and security needs helps in tailoring solutions that address specific vulnerabilities. By actively listening to feedback and concerns, cybersecurity professionals can effectively align security measures with organizational goals and user requirements. EMPATHY Empathy in cybersecurity refers to the ability of cybersecurity professionals to understand and consider the perspectives, emotions, and experiences of both colleagues and end-users affected by security measures or incidents. While empathy may not be the first trait that comes to mind in the context of cybersecurity, it plays a vital role in various aspects of the field. Professionals who practice empathy are better equipped to create user-friendly security solutions, provide support during incidents, and foster a culture of security awareness and cooperation. TEAMWORK AND COLLABORATION This skill involves the ability to work effectively with others, both within and outside the organization, to achieve common goals. It includes communicating clearly, sharing responsibilities, and integrating diverse perspectives and skills. Teamwork is paramount in cybersecurity, and its effectiveness in preventing cyberattacks. ADAPTABILITY AND FLEXIBILITY The rapid shift to remote work, especially post 2020 led to increased phishing attacks, showing the need for adaptable security strategies. Being flexible in security strategies is crucial to staying ahead of cybercriminals. Every organization’s security posture is different, and professionals may require coaching on adaptability to perform their roles optimally in a new environment. ATTENTION TO DETAIL Minor oversights in code or security protocols have led to numerous breaches. A prime example of this is the Heartbleed bug discovered in 2014. This bug was a security flaw in the OpenSSL cryptography library, which is widely used for the SSL/TLS protocol to secure internet communication. The oversight in OpenSSL allowed attackers to read sensitive information from the memory of systems protected by the vulnerable versions of OpenSSL, leading to the exposure of private keys, usernames, passwords, and other sensitive data. Attention to detail is essential in code development and security protocols to prevent such vulnerabilities. LEADERSHIP AND MANAGEMENT SKILLS Leadership plays a pivotal role in establishing a security-focused culture. Failures in this aspect have been at the root of many data breaches, emphasizing the need for strong leadership and management in cybersecurity teams. EMOTIONAL INTELLIGENCE Ransomware attacks often rely on psychological tactics. Having emotional intelligence enables professionals to better understand and defend against these tactics, enhancing cybersecurity resilience. In the context of ransomware, attackers frequently use tactics designed to create urgency, fear, or confusion, prompting victims to act impulsively, such as by paying a ransom. In such situations, cybersecurity professionals with high EI can better understand these manipulative tactics, allowing them to educate and prepare users and organizations to respond appropriately. ETHICAL JUDGMENT AND INTEGRITY Insider threats, often stemming from ethical lapses, have been responsible for corporate espionage cases. Ethical judgment and integrity are critical in maintaining trust and security within organizations. Honesty towards designated portfolio stakeholders and maintaining highest moral standards is critical to securing any enterprise. CONTINUOUS LEARNING AND CURIOSITY The evolving nature of cyber threats necessitates continuous learning and curiosity among cybersecurity experts. Staying updated and adaptive is essential to effectively combat emerging risks. Emphasizing the importance of staying informed and adaptable in the field of cybersecurity, Lohrmann stressed the need for a proactive approach in keeping abreast of the latest technological advancements and hacker tactics. “Being curious with a thirst for knowledge and hunger to learn more. We need to be life-long learners with tech changing so rapidly. Also, good communicator – with the more modes the better (writing, speaking, listening). Also, humble but bold at the same time. Don’t be afraid to ask questions,” he said. DECODING CYBERSECURITY DECISIONS Tim Pappa, a certified former FBI profiler with expertise in cyber deception and online influence from the Behavioral Analysis Unit, highlighted the importance of naturalistic decision-making in cybersecurity during his discussion with The Cyber Express. He drew upon Gary Klein’s research to emphasize his points. “There have been a few researchers over the past several decades who have developed various models of naturalistic decision making. Gary Klein, for instance, explored how fire commanders make crisis decisions, uncovering that many rely on what he termed the ‘recognition-primed model.’ This approach is rooted in experiential learning, allowing for quick decisions that seem instinctive but are actually informed by past experience and an understanding of what’s likely to succeed,” Pappa said. Gary Klein’s study, titled “Rapid Decision Making on the Fire Ground,” investigates how fire commanders make quick decisions during emergencies. The research introduces the “Recognition-Primed Decision” (RPD) model, demonstrating that these rapid decisions are informed by commanders’ extensive experience and knowledge. This study significantly contributes to the understanding of naturalistic decision-making in critical situations. This is particularly relevant to the cybersecurity sector, which frequently demands rapid and high-pressure decision-making. Pappa suggests that this model can be applied to cybersecurity, considering the dynamic nature of human lives and the complex variables influencing decision-making. “Naturalistic decision-making challenges traditional models by recognizing the dynamic nature of human lives and decisions. It understands that decisions are influenced by various unknown factors in a person’s life, like relationships and organizational constraints, and these factors can change over time,” he added. “In criminology and cybersecurity, the distinction isn’t always black and white. It raises questions about whether automated software can identify and follow patterns in a cyber threat actor’s campaign over time and if threat actors consider these factors when exploiting vulnerabilities in network defense, he added further. Pappa argues for a focus on soft skills, recognizing the necessity for a more humanistic model in cybersecurity. This approach acknowledges the diverse motivations and circumstances of individuals, including cybercriminals. BRIDGING THE SOFT SKILLS GAP IN CYBERSECURITY The recognition of soft skills’ significance in cybersecurity is on the rise within the cyber sector. According to the ISACA’s State of Cybersecurity 2023 report, soft skills have emerged as a significant gap in the cybersecurity field, highlighting that 54% of cybersecurity professionals rated soft skills as the greatest skills gap. These skills are not merely additional qualities but are becoming central in the complex digital space, especially with the advent of AI and evolving global regulations. The top soft skills identified as crucial for security professionals include communication, critical thinking, problem-solving, teamwork, and attention to detail. The rise of social engineering attacks—a tactic that preys on human psychology and exploits interpersonal vulnerabilities rather than technical weaknesses is a growing concern. With AI playing a bigger role, these attacks are only going to get harder to detect. These attacks often leverage trust, persuasion, and psychological manipulation to bypass traditional security measures. Phishing emails, pretexting phone calls, and impersonation scams are common examples of social engineering techniques. According to the 2023 Ponemon Institute’s Cost of Phishing Study, a staggering 83% of organizations experienced a phishing attack in the past year. A key finding of this study is the identification of poor employee awareness and training as a major contributing factor to these incidents. No firewall or encryption can fully protect against an unsuspecting employee falling victim to a well-crafted phishing email or a convincing social engineering ploy. Cyber defenders now need a holistic skill set that includes not just technical prowess but also strong communication, critical thinking, and awareness of human behavior. IDENTIFYING AND CULTIVATING SOFT SKILLS CHALLENGES The challenges in identifying and developing soft skills within the cybersecurity workforce are multifaceted, as highlighted by both industry insights and academic research. Cyble’s Senior Researcher observations align closely with findings from broader industry studies, shedding light on the nuanced difficulties organizations face in this area. He points out that the common assessment criteria in cybersecurity hirings are heavily focused towards technical skills, often based on certifications. This approach leaves the assessment of soft skills to team leads or managers, which can burden the organizational structure. The need for a more comprehensive and trait-specific soft skills hiring assessment model is crucial for organizational success. This observation is substantiated by an ISACA report, which shows that while technical skills like identity and access management and cloud computing are heavily sought after, soft skills such as communication and critical thinking are not emphasized to the same extent, despite their recognized importance. According to the report, the most significant skill gaps identified in today’s cybersecurity professionals include soft skills (55%), followed by cloud computing expertise (47%), knowledge in security controls (35%), and abilities in coding (30%) and software development (30%). Additionally, Cyble’s Senior Researcher discusses the ‘Talent Crunch & Skill Combo’ issue, highlighting the rarity of finding cybersecurity professionals with both technical and soft skills. “The industry as it is having a critical shortage of skilled cybersecurity professionals and its rare to find both technical and soft skills, hence organizations have to make do by compromising on either of them and more so on soft skills to keep up with business operations pressure,” he told The Cyber Express. This forces organizations to compromise, often on soft skills, to maintain business operations. This is echoed in the broader industry context where 59% of cybersecurity leaders say their teams are understaffed, leading to a focus on filling roles with a primary emphasis on technical skills. The impact of strong soft skills on cybersecurity risk management and incident response efforts is significant. Cyble’s Senior Researcher mention of the need for cybersecurity professionals to evolve their focus beyond IT security to encompass risk management, governance, and compliance is particularly relevant. As cybersecurity challenges intensify, effective collaboration with various stakeholders becomes critical for audits, legal compliance, business risk assessments, and business continuity planning, necessitating strong soft skills. Dan Lohrmann, addressing challenges in the modern work environment, particularly emphasizes the difficulties posed by a shift to a largely virtual setting. Speaking to The Cyber Express, he notes, “Moving meetings and so much conversation online makes it hard to really know someone well. We used to be almost 100% in-person, and we are not going back to those days, but it is harder than ever to learn by osmosis (just being around people).” This shift has particularly affected the learning and development of younger workers. Lohrmann highlights their unique challenge, stating, “Younger workers can’t see their senior colleagues ‘in-action’ as much – unless the inclusion is very intentional, which is much harder to do consistently on a wide scale.” His observations point to the need for more deliberate and structured approaches to mentoring and knowledge sharing in remote or hybrid work environments. This is crucial for fostering the same level of learning and professional development that was more naturally facilitated in traditional, in-person settings. SOFT SKILLS IN THE FUTURE OF CYBERSECURITY The future of cybersecurity is increasingly recognizing the vital role of soft skills. As noted by experts, these skills are becoming crucial due to the evolving nature of cyber threats and the integration of technologies like AI and GenAI. “As cybersecurity challenges intensify, so would the collaboration with various stakeholder to maintain flow of information for audits, legal, Business Risk Assessment, and BCP planning and management. Hence, the soft skills will be more than ever essential for maintaining team collaborations and high level of security in the organization,” Cyble Senior Researcher adds. While technical skills remain a cornerstone in cybersecurity, the development and integration of soft skills into the workforce are vital for addressing current and future challenges in the field. The concept of ‘human-centric AI’ highlights the need for skills that distinguish humans from machines. “The ‘human-centric’ part is all about building those soft skills that differentiate humans from robots and machines. I only see the importance of building stronger soft skills growing in the years ahead within cybersecurity,” concluded Lohrmann while stressing upon the need for soft skiils, especially with the way AI is being integrated in day-to-day life, and the tasks involving cybersecurity. Moreover, organizations need to adapt their hiring and training strategies to create a more balanced skill set in their cybersecurity teams. This balanced approach is essential for the overall effectiveness and resilience of cybersecurity operations within organizations. Professionals with strong interpersonal skills can play a pivotal role in educating and empowering teams to recognize and resist these attacks. Training programs focused on cybersecurity awareness, incident response, and social engineering simulations can significantly reduce the susceptibility of individuals within an organization. Furthermore, cybersecurity professional’s adept at understanding and communicating across departments—bridging the gap between technical teams, management, and end-users—can implement comprehensive security protocols and create a culture of vigilance against social engineering attacks. In essence, the evolution of cybersecurity demands a shift towards recognizing the human element as a critical factor in defense. Combining technical expertise with strong interpersonal skills is the new frontier in fortifying organizations against the ever-growing sophistication of social engineering threats. SHARE THIS: * Click to share on LinkedIn (Opens in new window) * Click to share on Reddit (Opens in new window) * Click to share on Twitter (Opens in new window) * Click to share on Facebook (Opens in new window) * More * * Click to email a link to a friend (Opens in new window) * Click to share on WhatsApp (Opens in new window) * RELATED STRENGTHENING HEALTHCARE SECURITY: CISA’S CYBERSECURITY TOOLKIT UNVEILED The CISA Cybersecurity Toolkit For Healthcare and Public Health is a collaborative effort between key players in the cybersecurity and healthcare domains. October 27, 2023 In "Cybersecurity News" TAIWAN RAMPS UP CYBERSECURITY AMID RISING THREATS Taiwan is intensifying efforts to fortify Taiwan cybersecurity defenses against a potential full-blown cyberattack from China. As fears mount over the vulnerability of Taiwan's financial system to advanced hacks, government officials and financial institutions in Taipei are collaborating with US cybersecurity experts to enhance their digital resilience. Taiwan Cybersecurity: Alarming… December 12, 2023 In "Cybersecurity News" EMERGING TRENDS AND CHALLENGES IN CYBERSECURITY: INSIGHTS FROM ABUL KALAM AZAD In a comprehensive exploration of the dynamic cybersecurity terrain, Abul Kalam Azad, Head of Information Security at Eastern Bank, shares invaluable insights in an interview with Augustin Kurian, Editor-in-Chief of The Cyber Express. With over two decades of expertise in IT audit, risk management, and cybersecurity, Azad illuminates the cybersecurity… December 16, 2023 In "Firewall Daily" Tags: cybersecuritySoft SkillsSoft Skills in CYbersecurityThe Cyber ExpressThe Cyber Express News Previous Post AI-DRIVEN CYBERSECURITY: TRANSFORMING DEFENSE STRATEGIES FOR THE DIGITAL AGE Next Post GACHA GAMES DECODED: CONTROVERSIES, PSYCHOLOGY, COPING AVANTIKA CHOPRA Associate Editor, The Cyber Express RELATED POSTS Dark Web News DATABASE SALE ON DARK WEB PUTS GEICO IN THE ATTACKERS CROSSHAIRS AGAIN by Ashish Khaitan January 15, 2024 Dark Web News TCE EXCLUSIVE: MCDONALD’S DATA BREACH 2024, A CONTINUATION OF CYBERSECURITY DILEMMAS by Editorial January 15, 2024 Firewall Daily TURA SCANDINAVIA AB ENCOUNTERS ANOTHER CYBERATTACK FOLLOWING INTRUSION IN DECEMBER by Ashish Khaitan January 15, 2024 Firewall Daily NONAME TARGETS MULTIPLE WEBSITES IN LITHUANIA, BLAMES IT FOR AIDING UKRAINE by Ashish Khaitan January 15, 2024 Features NAVIGATING DIGITAL CHAOS: TAMING RISKS IN THE AGE OF GENERATIVE AI by Editorial January 14, 2024 Next Post GACHA GAMES DECODED: CONTROVERSIES, PSYCHOLOGY, COPING LEAVE A REPLY CANCEL REPLY Your email address will not be published. Required fields are marked * Comment * Name * Email * Website Save my name, email, and website in this browser for the next time I comment. Privacy Policy Agreement * I agree to the Terms & Conditions and Privacy Policy. Notify me of follow-up comments by email. Notify me of new posts by email. Δ This site uses Akismet to reduce spam. Learn how your comment data is processed. LATEST ISSUE IS OUT. SUBSCRIBE NOW Follow Us On Google News LATEST CYBER NEWS Dark Web News DATABASE SALE ON DARK WEB PUTS GEICO IN THE ATTACKERS CROSSHAIRS AGAIN January 15, 2024 Dark Web News TCE EXCLUSIVE: MCDONALD’S DATA BREACH 2024, A CONTINUATION OF CYBERSECURITY DILEMMAS January 15, 2024 Firewall Daily TURA SCANDINAVIA AB ENCOUNTERS ANOTHER CYBERATTACK FOLLOWING INTRUSION IN DECEMBER January 15, 2024 Firewall Daily NONAME TARGETS MULTIPLE WEBSITES IN LITHUANIA, BLAMES IT FOR AIDING UKRAINE January 15, 2024 CATEGORIES Categories Select Category Appointments Budgets Bug Bounty & Rewards Business News Compliance Cyber Essentials Cyber Warfare Cybersecurity Awareness Month Cybersecurity News Dark Web News Data Breach News DDoS Attacks News Deepfake Espionage Features Firewall Daily Gitex2022 Governance Hacker Claims Hacker News Hacking News How to Interviews Learning & Development Lockbit Ransomware News Main Story Malware News Market Reports Mergers & Aquisitions Partnerships Podcast Policy Updates Press Release Ransomware News Regulations Research Resources Sponsored Content Startups Threat Intelligence Threat Intelligence News Vulnerabilities Vulnerability News Whitepapers Workforce Select Category WEB STORIES Top 10 CISOs to Follow in 2023 Top 10 Ransomware Gangs in 2023 Top 5 IoT Security Risks in 2023 Top 10 CTF Platforms in 2023 Types of Risks Covered by Cyber Insurance ABOUT THE CYBER EXPRESS BY CYBLE #1 Trending Cybersecurity News and Magazine The Cyber Express by Cyble is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats. CONTACT For editorial queries: editor@thecyberexpress.com For marketing and Sales: raj@thecyberexpress.com For Events & Conferences related information: ashish.j@thecyberexpress.com QUICK LINKS * About Us * Advertise With Us * Contact Us * Editorial Calendar * Careers * The Cyber Express by Cyble Vulnerability Disclosure Policy OUR ADDRESS We’re remote friendly, with office locations around the world: San Francisco, Atlanta, Rome, Dubai, Mumbai, Bangalore, Hyderabad, Singapore, Jakarta, Sydney, and Melbourne Headquarters: The Cyber Express LLC 555 North Point Center E Alpharetta, GA 30022, USA. India Office: Cyber Express Media Network HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063 SUBSCRIBE TO OUR FEED RSS Feeds Follow Us On Google News * Privacy Statement * Terms of Use * Write For Us © 2024 The Cyber Express (Cybersecurity News and Magazine) | By Cyble Inc. No Result View All Result * Magazine * Firewall Daily * Essentials * Regulations * Compliance * Governance * Policy Updates * Features * Cyber Warfare * Espionage * Workforce * Learning & Development * Business * Startups * Mergers & Aquisitions * Partnerships * Appointments * Budgets * Research * Whitepapers * Sponsored Content * Market Reports * Interviews * Podcast * Events * World CyberCon 3rd Edition – META * World CyberCon India 2023 * Cyber Security Webinar * Endorsed Events * Products * Cyble Vision * Cyble Hawk (LEA, Govt.) * Am I Breached * Cyble Odin © 2024 The Cyber Express (Cybersecurity News and Magazine) | By Cyble Inc. WELCOME BACK! Login to your account below Remember Me Forgotten Password? RETRIEVE YOUR PASSWORD Please enter your username or email address to reset your password. Log In ADD NEW PLAYLIST - Select Visibility -PublicPrivate This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy. I Agree Top 10 CISOs to Follow in 2023 Top 10 Ransomware Gangs in 2023 Top 5 IoT Security Risks in 2023 Top 10 CTF Platforms in 2023 Types of Risks Covered by Cyber Insurance Stay up-to-date on the latest security news, trends, and thought leadership. AllowCancel WELCOME TO THECYBEREXPRESS.COM THECYBEREXPRESS.COM ASKS FOR YOUR CONSENT TO USE YOUR PERSONAL DATA TO: * perm_identity Personalised advertising and content, advertising and content measurement, audience research and services development * devices Store and/or access information on a device expand_moreremove Learn more * How can I change my choice? * What if I don't consent? * How does legitimate interest work? * Do I have to consent to everything? Your personal data will be processed and information from your device (cookies, unique identifiers, and other device data) may be stored by, accessed by and shared with 135 TCF vendor(s) and 67 ad partner(s), or used specifically by this site or app. Some vendors may process your personal data on the basis of legitimate interest, which you can object to by managing your options below. Look for a link at the bottom of this page or in our privacy policy where you can withdraw consent. Consent Manage options arrow_back Data preferences MANAGE YOUR DATA You can choose how your personal data is used. Vendors want your permission to do the following: TCF vendors help_outline STORE AND/OR ACCESS INFORMATION ON A DEVICE Cookies, device or similar online identifiers (e.g. login-based identifiers, randomly assigned identifiers, network based identifiers) together with other information (e.g. browser type and information, language, screen size, supported technologies etc.) can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. View details Consent (119 vendors) USE LIMITED DATA TO SELECT ADVERTISING Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are (or have been) interacting with (for example, to limit the number of times an ad is presented to you). View details Consent (70 vendors)Legitimate interest (32 vendors)help_outline CREATE PROFILES FOR PERSONALISED ADVERTISING Information about your activity on this service (such as forms you submit, content you look at) can be stored and combined with other information about you (for example, information from your previous activity on this service and other websites or apps) or similar users. This is then used to build or improve a profile about you (that might include possible interests and personal aspects). Your profile can be used (also later) to present advertising that appears more relevant based on your possible interests by this and other entities. View details Consent (98 vendors) USE PROFILES TO SELECT PERSONALISED ADVERTISING Advertising presented to you on this service can be based on your advertising profiles, which can reflect your activity on this service or other websites or apps (like the forms you submit, content you look at), possible interests and personal aspects. View details Consent (92 vendors) CREATE PROFILES TO PERSONALISE CONTENT Information about your activity on this service (for instance, forms you submit, non-advertising content you look at) can be stored and combined with other information about you (such as your previous activity on this service or other websites or apps) or similar users. This is then used to build or improve a profile about you (which might for example include possible interests and personal aspects). Your profile can be used (also later) to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. View details Consent (32 vendors) USE PROFILES TO SELECT PERSONALISED CONTENT Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services (for instance, the forms you submit, content you look at), possible interests and personal aspects, such as by adapting the order in which content is shown to you, so that it is even easier for you to find (non-advertising) content that matches your interests. View details Consent (26 vendors) MEASURE ADVERTISING PERFORMANCE Information regarding which advertising is presented to you and how you interact with it can be used to determine how well an advert has worked for you or other users and whether the goals of the advertising were reached. For instance, whether you saw an ad, whether you clicked on it, whether it led you to buy a product or visit a website, etc. This is very helpful to understand the relevance of advertising campaigns. View details Consent (77 vendors)Legitimate interest (46 vendors)help_outline MEASURE CONTENT PERFORMANCE Information regarding which content is presented to you and how you interact with it can be used to determine whether the (non-advertising) content e.g. reached its intended audience and matched your interests. For instance, whether you read an article, watch a video, listen to a podcast or look at a product description, how long you spent on this service and the web pages you visit etc. This is very helpful to understand the relevance of (non-advertising) content that is shown to you. View details Consent (31 vendors)Legitimate interest (14 vendors)help_outline UNDERSTAND AUDIENCES THROUGH STATISTICS OR COMBINATIONS OF DATA FROM DIFFERENT SOURCES Reports can be generated based on the combination of data sets (like user profiles, statistics, market research, analytics data) regarding your interactions and those of other users with advertising or (non-advertising) content to identify common characteristics (for instance, to determine which target audiences are more receptive to an ad campaign or to certain contents). View details Consent (57 vendors)Legitimate interest (20 vendors)help_outline DEVELOP AND IMPROVE SERVICES Information about your activity on this service, such as your interaction with ads or content, can be very helpful to improve products and services and to build new products and services based on user interactions, the type of audience, etc. This specific purpose does not include the development or improvement of user profiles and identifiers. View details Consent (65 vendors)Legitimate interest (37 vendors)help_outline USE LIMITED DATA TO SELECT CONTENT Content presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type, or which content you are (or have been) interacting with (for example, to limit the number of times a video or an article is presented to you). View details Consent (9 vendors)Legitimate interest (2 vendors)help_outline ENSURE SECURITY, PREVENT AND DETECT FRAUD, AND FIX ERRORS help_outline Your data can be used to monitor for and prevent unusual and possibly fraudulent activity (for example, regarding advertising, ad clicks by bots), and ensure systems and processes work properly and securely. It can also be used to correct any problems you, the publisher or the advertiser may encounter in the delivery of content and ads and in your interaction with them. View details DELIVER AND PRESENT ADVERTISING AND CONTENT help_outline Certain information (like an IP address or device capabilities) is used to ensure the technical compatibility of the content or advertising, and to facilitate the transmission of the content or ad to your device. View details MATCH AND COMBINE DATA FROM OTHER DATA SOURCES help_outline Information about your activity on this service may be matched and combined with other information relating to you and originating from various sources (for instance your activity on a separate online service, your use of a loyalty card in-store, or your answers to a survey), in support of the purposes explained in this notice. View details LINK DIFFERENT DEVICES help_outline In support of the purposes explained in this notice, your device might be considered as likely linked to other devices that belong to you or your household (for instance because you are logged in to the same service on both your phone and your computer, or because you may use the same Internet connection on both devices). View details IDENTIFY DEVICES BASED ON INFORMATION TRANSMITTED AUTOMATICALLY help_outline Your device might be distinguished from other devices based on information it automatically sends when accessing the Internet (for instance, the IP address of your Internet connection or the type of browser you are using) in support of the purposes exposed in this notice. View details USE PRECISE GEOLOCATION DATA With your acceptance, your precise location (within a radius of less than 500 metres) may be used in support of the purposes explained in this notice. View details Consent Vendor preferences Accept all Confirm choices arrow_back Vendor preferences CONFIRM OUR VENDORS Vendors can use your data to provide services. Declining a vendor can stop them from using the data you shared. TCF vendors help_outline EXPONENTIAL INTERACTIVE, INC D/B/A VDX.TV Cookie duration: 90 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, IP addresses, Device identifiers, Non-precise location data more Cookie duration resets each session. View details | Storage details | Privacy policylaunch Consent ROQ.AD GMBH Cookie duration: 365 (days). Data collected and processed: Browsing and interaction data, Privacy choices, Probabilistic identifiers, Authentication-derived identifiers, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data more Cookie duration resets each session. View details | Storage details | Privacy policylaunch Consent ADMAXIM LIMITED Cookie duration: 30 (days). Data collected and processed: Browsing and interaction data, Probabilistic identifiers, IP addresses more Cookie duration resets each session. View details | Storage details | Privacy policylaunch Consent INDEX EXCHANGE INC. Cookie duration: 395 (days). Data collected and processed: Privacy choices, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data more Cookie duration resets each session. Uses other forms of storage. View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline QUANTCAST Cookie duration: 396 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, Authentication-derived identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data, User-provided data more Cookie duration resets each session. Uses other forms of storage. View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline BEESWAXIO CORPORATION Cookie duration: 395 (days). Data collected and processed: Browsing and interaction data, Privacy choices, Probabilistic identifiers, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data more Cookie duration resets each session. Uses other forms of storage. View details | Storage details | Privacy policylaunch Consent SOVRN, INC. Cookie duration: 365 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, IP addresses, Device characteristics, Non-precise location data more Cookie duration resets each session. Uses other forms of storage. View details | Privacy policylaunch Consent ADIKTEEV Doesn't use cookies. Data collected and processed: Users’ profiles, Probabilistic identifiers, Authentication-derived identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data more Uses other forms of storage. View details | Privacy policylaunch ConsentLegitimate interesthelp_outline RTB HOUSE S.A. Cookie duration: 365 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, IP addresses, Device characteristics, Device identifiers, Non-precise location data more Cookie duration resets each session. Uses other forms of storage. View details | Privacy policylaunch Consent THE UK TRADE DESK LTD Cookie duration: 3629 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, Authentication-derived identifiers, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data more Cookie duration resets each session. Uses other forms of storage. View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline ADMETRICS GMBH Doesn't use cookies. Data collected and processed: Browsing and interaction data, Privacy choices, IP addresses, Device characteristics more View details | Privacy policylaunch Consent AMOBEE INC. Cookie duration: 180 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data more Cookie duration resets each session. Uses other forms of storage. View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline EPSILON Cookie duration: 184 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, Authentication-derived identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data, User-provided data more Cookie duration resets each session. Uses other forms of storage. View details | Privacy policylaunch Consent YAHOO EMEA LIMITED Cookie duration: 397 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data more Cookie duration resets each session. View details | Storage details | Privacy policylaunch Consent ADVENTORI SAS Cookie duration: 90 (days). Data collected and processed: Browsing and interaction data, Authentication-derived identifiers, IP addresses, Device identifiers, Non-precise location data, User-provided data more Cookie duration resets each session. Uses other forms of storage. View details | Privacy policylaunch Consent TRIPLELIFT, INC. Cookie duration: 90 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Authentication-derived identifiers, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data more Cookie duration resets each session. Uses other forms of storage. View details | Privacy policylaunch ConsentLegitimate interesthelp_outline XANDR, INC. Cookie duration: 90 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Authentication-derived identifiers, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data more Cookie duration resets each session. Uses other forms of storage. View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline NEORY GMBH Cookie duration: 90 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, Authentication-derived identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data, User-provided data more Cookie duration resets each session. View details | Privacy policylaunch Consent UNRULY GROUP LLC Cookie duration: 365 (days). Data collected and processed: Users’ profiles, Privacy choices, Probabilistic identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data more Cookie duration resets each session. View details | Privacy policylaunch ConsentLegitimate interesthelp_outline NEURAL.ONE Cookie duration: 365 (days). Data collected and processed: Browsing and interaction data, Privacy choices, Probabilistic identifiers, IP addresses, Device characteristics, Non-precise location data more Cookie duration resets each session. Uses other forms of storage. View details | Privacy policylaunch Consent ADITION (VIRTUAL MINDS GMBH) Cookie duration: 365 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data, User-provided data more Cookie duration resets each session. View details | Storage details | Privacy policylaunch Consent ACTIVE AGENT (VIRTUAL MINDS GMBH) Cookie duration: 365 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data, User-provided data more Cookie duration resets each session. View details | Storage details | Privacy policylaunch Consent TABOOLA EUROPE LIMITED Cookie duration: 366 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data more Cookie duration resets each session. Uses other forms of storage. View details | Storage details | Privacy policylaunch Consent EQUATIV Cookie duration: 396 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, Authentication-derived identifiers, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data more Uses other forms of storage. View details | Storage details | Privacy policylaunch Consent ADFORM A/S Cookie duration: 1 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, Authentication-derived identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data, User-provided data more View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline MAGNITE, INC. Cookie duration: 365 (days). Data collected and processed: Browsing and interaction data, Privacy choices, Probabilistic identifiers, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data more Uses other forms of storage. View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline RATEGAIN ADARA INC Cookie duration: 730 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Authentication-derived identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data, User-provided data more View details | Storage details | Privacy policylaunch Consent SIFT MEDIA, INC Doesn't use cookies. Data collected and processed: IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data more View details | Privacy policylaunch Consent RAKUTEN MARKETING LLC Cookie duration: 730 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, Authentication-derived identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data, User-provided data more Cookie duration resets each session. Uses other forms of storage. View details | Privacy policylaunch ConsentLegitimate interesthelp_outline LUMEN RESEARCH LIMITED Doesn't use cookies. Data collected and processed: Browsing and interaction data, IP addresses, Device characteristics, Non-precise location data more View details | Privacy policylaunch Legitimate interesthelp_outline AMAZON AD SERVER Cookie duration: 396 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Authentication-derived identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data more Cookie duration resets each session. Uses other forms of storage. View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline OPENX Cookie duration: 365 (days). Data collected and processed: Browsing and interaction data, Privacy choices, IP addresses, Device characteristics, Device identifiers, Non-precise location data more Cookie duration resets each session. View details | Storage details | Privacy policylaunch Consent YIELDLAB (VIRTUAL MINDS GMBH) Cookie duration: 365 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data, User-provided data more Cookie duration resets each session. View details | Storage details | Privacy policylaunch Consent ROKU ADVERTISING SERVICES Cookie duration: 396 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, Authentication-derived identifiers, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data, User-provided data more Cookie duration resets each session. Uses other forms of storage. View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline SIMPLIFI HOLDINGS INC Cookie duration: 366 (days). Data collected and processed: IP addresses, Precise location data, Device identifiers more Uses other forms of storage. View details | Privacy policylaunch Consent PUBMATIC, INC Cookie duration: 90 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, Authentication-derived identifiers, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data, User-provided data more Uses other forms of storage. View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline COMSCORE B.V. Cookie duration: 720 (days). Data collected and processed: Browsing and interaction data, Privacy choices, Probabilistic identifiers, Authentication-derived identifiers, IP addresses, Device characteristics, Device identifiers, User-provided data more Cookie duration resets each session. Uses other forms of storage. View details | Privacy policylaunch Consent FLASHTALKING Cookie duration: 730 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, Authentication-derived identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data more View details | Privacy policylaunch Consent PULSEPOINT, INC. Cookie duration: 365 (days). Data collected and processed: IP addresses, Device characteristics, Device identifiers more Cookie duration resets each session. Uses other forms of storage. View details | Privacy policylaunch Consent SMAATO, INC. Cookie duration: 21 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Authentication-derived identifiers, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data, User-provided data more Cookie duration resets each session. Uses other forms of storage. View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline SEMASIO GMBH Cookie duration: 366 (days). Data collected and processed: Browsing and interaction data, Privacy choices, IP addresses, Device identifiers more Cookie duration resets each session. View details | Storage details | Privacy policylaunch Consent CRIMTAN HOLDINGS LIMITED Cookie duration: 365 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, Authentication-derived identifiers, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data, User-provided data more Cookie duration resets each session. View details | Privacy policylaunch ConsentLegitimate interesthelp_outline GENIUS SPORTS UK LIMITED Cookie duration: 365 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, Authentication-derived identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data more Cookie duration resets each session. View details | Storage details | Privacy policylaunch Consent CRITEO SA Cookie duration: 390 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, Authentication-derived identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data more Uses other forms of storage. View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline ADLOOX SA Doesn't use cookies. Data collected and processed: Browsing and interaction data, Probabilistic identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data more Uses other forms of storage. View details | Privacy policylaunch ConsentLegitimate interesthelp_outline BLIS GLOBAL LIMITED Cookie duration: 400 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, Authentication-derived identifiers, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data, User-provided data more Cookie duration resets each session. Uses other forms of storage. View details | Storage details | Privacy policylaunch Consent LOTAME SOLUTIONS, INC Cookie duration: 274 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, Authentication-derived identifiers, IP addresses, Device characteristics, Device identifiers, User-provided data more Cookie duration resets each session. Uses other forms of storage. View details | Privacy policylaunch Consent LIVERAMP Cookie duration: 365 (days). Data collected and processed: Browsing and interaction data, Privacy choices, Authentication-derived identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data more Cookie duration resets each session. Uses other forms of storage. View details | Storage details | Privacy policylaunch Consent GROUPM UK LIMITED Cookie duration: 395 (days). Data collected and processed: Browsing and interaction data, Privacy choices, Probabilistic identifiers, Authentication-derived identifiers, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data more Cookie duration resets each session. View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline LOOPME LIMITED Cookie duration: 90 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data, User-provided data more Cookie duration resets each session. Uses other forms of storage. View details | Storage details | Privacy policylaunch Consent DYNATA LLC Cookie duration: 365 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Authentication-derived identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data, User-provided data more Cookie duration resets each session. View details | Storage details | Privacy policylaunch Consent ASK LOCALA Doesn't use cookies. Data collected and processed: Privacy choices, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data more Uses other forms of storage. View details | Privacy policylaunch Consent NEAR INTELLIGENCE Doesn't use cookies. Data collected and processed: Browsing and interaction data, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data more Uses other forms of storage. View details | Privacy policylaunch Consent DOUBLEVERIFY INC. Doesn't use cookies. Data collected and processed: Browsing and interaction data, Privacy choices, Probabilistic identifiers, IP addresses, Device characteristics, Non-precise location data more View details | Privacy policylaunch Legitimate interesthelp_outline BIDSWITCH GMBH Cookie duration: 365 (days). Data collected and processed: Browsing and interaction data, Privacy choices, Probabilistic identifiers, Authentication-derived identifiers, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data more Cookie duration resets each session. Uses other forms of storage. View details | Storage details | Privacy policylaunch Consent IPONWEB GMBH Cookie duration: 365 (days). Data collected and processed: Browsing and interaction data, Privacy choices, Authentication-derived identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data, User-provided data more Cookie duration resets each session. Uses other forms of storage. View details | Storage details | Privacy policylaunch Consent NEXTROLL, INC. Cookie duration: 183 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, IP addresses, Device characteristics, Device identifiers, Non-precise location data, User-provided data more Cookie duration resets each session. View details | Privacy policylaunch Consent TEADS FRANCE SAS Cookie duration: 365 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data more Uses other forms of storage. View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline STRÖER SSP GMBH (SSP) Cookie duration: 365 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data more Uses other forms of storage. View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline OS DATA SOLUTIONS GMBH & CO. KG Cookie duration: 90 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data, User-provided data more Uses other forms of storage. View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline PERMODO GMBH Doesn't use cookies. Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, IP addresses, Device characteristics, Device identifiers, Non-precise location data more Uses other forms of storage. View details | Privacy policylaunch Consent PLATFORM161 B.V. Cookie duration: 396 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data more Cookie duration resets each session. Uses other forms of storage. View details | Storage details | Privacy policylaunch Consent ADACADO TECHNOLOGIES INC. (DBA ADACADO) Cookie duration: 365 (days). Data collected and processed: Browsing and interaction data, Privacy choices, IP addresses, Non-precise location data more Cookie duration resets each session. View details | Storage details | Privacy policylaunch Consent BASIS GLOBAL TECHNOLOGIES, INC. Cookie duration: 365 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Authentication-derived identifiers, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data more Cookie duration resets each session. View details | Privacy policylaunch ConsentLegitimate interesthelp_outline SMADEX, S.L.U. Cookie duration: 365 (days). Data collected and processed: Users’ profiles, Privacy choices, Probabilistic identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data, User-provided data more Cookie duration resets each session. View details | Storage details | Privacy policylaunch Consent BOMBORA INC. Cookie duration: 365 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Authentication-derived identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data more Cookie duration resets each session. Uses other forms of storage. View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline EASYMEDIA GMBH Cookie duration: 365 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data more Cookie duration resets each session. View details | Storage details | Privacy policylaunch Consent REMERGE GMBH Doesn't use cookies. Data collected and processed: Browsing and interaction data, IP addresses, Device characteristics, Device identifiers, Non-precise location data more Uses other forms of storage. View details | Privacy policylaunch ConsentLegitimate interesthelp_outline ADVANCED STORE GMBH Cookie duration: 365 (days). Data collected and processed: Device identifiers more Cookie duration resets each session. Uses other forms of storage. View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline MAGNITE CTV, INC. Cookie duration: 366 (days). Data collected and processed: Browsing and interaction data, Privacy choices, Probabilistic identifiers, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data more View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline DELTA PROJECTS AB Cookie duration: 365 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, Authentication-derived identifiers, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data, User-provided data more View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline USEMAX ADVERTISEMENT (EMEGO GMBH) Cookie duration: 365 (days). Data collected and processed: Users’ profiles more Cookie duration resets each session. View details | Storage details | Privacy policylaunch Consent EMETRIQ GMBH Cookie duration: 365 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, Authentication-derived identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data, User-provided data more Cookie duration resets each session. Uses other forms of storage. View details | Storage details | Privacy policylaunch Consent PUBLICIS MEDIA GMBH Cookie duration: 1825 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, Authentication-derived identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data, User-provided data more Cookie duration resets each session. Uses other forms of storage. View details | Privacy policylaunch Consent M.D. PRIMIS TECHNOLOGIES LTD. Cookie duration: 25 (days). Data collected and processed: Browsing and interaction data, Privacy choices, Probabilistic identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data, User-provided data more View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline ONETAG LIMITED Cookie duration: 396 (days). Data collected and processed: Browsing and interaction data, Privacy choices, IP addresses, Device characteristics, Device identifiers, Non-precise location data more Cookie duration resets each session. Uses other forms of storage. View details | Storage details | Privacy policylaunch Consent CLOUD TECHNOLOGIES S.A. Cookie duration: 365 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Authentication-derived identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data more Cookie duration resets each session. View details | Privacy policylaunch Consent SMARTOLOGY LIMITED Doesn't use cookies. Data collected and processed: IP addresses more Uses other forms of storage. View details | Privacy policylaunch ConsentLegitimate interesthelp_outline IMPROVE DIGITAL Cookie duration: 90 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, Authentication-derived identifiers, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data, User-provided data more Cookie duration resets each session. View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline ADOBE ADVERTISING CLOUD Cookie duration: 365 (days). Data collected and processed: Privacy choices, Authentication-derived identifiers, IP addresses, Device identifiers more View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline BANNERFLOW AB Cookie duration: 366 (days). Data collected and processed: IP addresses more View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline TABMO SAS Doesn't use cookies. Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data, User-provided data more Uses other forms of storage. View details | Privacy policylaunch Consent INTEGRAL AD SCIENCE (INCORPORATING ADMANTX) Doesn't use cookies. Data collected and processed: Browsing and interaction data, Privacy choices, IP addresses, Device characteristics, Non-precise location data more View details | Privacy policylaunch Legitimate interesthelp_outline WIZALY Cookie duration: 365 (days). Data collected and processed: Browsing and interaction data, Privacy choices, Authentication-derived identifiers, IP addresses, Device characteristics, Non-precise location data more Cookie duration resets each session. Uses other forms of storage. View details | Storage details | Privacy policylaunch Consent WEBORAMA Cookie duration: 393 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, Authentication-derived identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data, User-provided data more Uses other forms of storage. View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline JIVOX CORPORATION Cookie duration: 30 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, IP addresses, Precise location data, Device identifiers, Non-precise location data more Cookie duration resets each session. View details | Storage details | Privacy policylaunch Consent MOBILE PROFESSIONALS BV / SAGE+ARCHER BV Doesn't use cookies. Data collected and processed: Non-precise location data more View details | Privacy policylaunch Consent ON DEVICE RESEARCH LIMITED Cookie duration: 30 (days). Data collected and processed: Browsing and interaction data, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data, User-provided data more View details | Storage details | Privacy policylaunch Consent ROCKABOX MEDIA LTD Doesn't use cookies. Data collected and processed: Browsing and interaction data, IP addresses, Device characteristics, Non-precise location data more View details | Storage details | Privacy policylaunch Legitimate interesthelp_outline EXACTAG GMBH Cookie duration: 180 (days). Data collected and processed: Browsing and interaction data, Privacy choices, Authentication-derived identifiers, IP addresses, Device characteristics, Device identifiers more Cookie duration resets each session. View details | Storage details | Privacy policylaunch Consent CELTRA INC. Doesn't use cookies. Data collected and processed: IP addresses, Device characteristics, Precise location data, Device identifiers more Uses other forms of storage. View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline MAINADV SRL Cookie duration: 30 (days). Data collected and processed: Browsing and interaction data, Privacy choices, IP addresses, Device characteristics, Device identifiers, Non-precise location data, User-provided data more Uses other forms of storage. View details | Privacy policylaunch Consent GEMIUS SA Cookie duration: 1825 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Device characteristics, Device identifiers more Cookie duration resets each session. Uses other forms of storage. View details | Privacy policylaunch Consent THE KANTAR GROUP LIMITED Cookie duration: 914 (days). Data collected and processed: Browsing and interaction data, Privacy choices, IP addresses, Device characteristics, Device identifiers, Non-precise location data more Cookie duration resets each session. Uses other forms of storage. View details | Privacy policylaunch Consent NIELSEN MEDIA RESEARCH LTD. Cookie duration: 120 (days). Data collected and processed: Browsing and interaction data, Privacy choices, IP addresses, Device characteristics, Device identifiers more Cookie duration resets each session. Uses other forms of storage. View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline SOLOCAL SA Cookie duration: 396 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data, User-provided data more Cookie duration resets each session. Uses other forms of storage. View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline PIXALATE, INC. Doesn't use cookies. Data collected and processed: Browsing and interaction data, IP addresses, Device characteristics, Device identifiers, Non-precise location data more View details | Storage details | Privacy policylaunch Consent ORACLE ADVERTISING Cookie duration: 180 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Authentication-derived identifiers, Device characteristics, Device identifiers, Non-precise location data, User-provided data more Uses other forms of storage. View details | Storage details | Privacy policylaunch Consent NUMBERLY Cookie duration: 180 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Authentication-derived identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data, User-provided data more Cookie duration resets each session. View details | Storage details | Privacy policylaunch Consent AUDIENCEPROJECT APS Cookie duration: 365 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, Authentication-derived identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data, User-provided data more Cookie duration resets each session. Uses other forms of storage. View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline DEMANDBASE, INC. Cookie duration: 730 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data, User-provided data more Cookie duration resets each session. Uses other forms of storage. View details | Storage details | Privacy policylaunch Consent EFFILIATION / EFFINITY Cookie duration: 2 (days). Data collected and processed: Device characteristics more Cookie duration resets each session. Uses other forms of storage. View details | Storage details | Privacy policylaunch Consent SEENTHIS AB Doesn't use cookies. Data collected and processed: IP addresses, Device characteristics more View details | Privacy policylaunch COMMANDERS ACT Cookie duration: 365 (days). Data collected and processed: IP addresses, Device identifiers more View details | Storage details | Privacy policylaunch Consent TRAVEL AUDIENCE GMBH Cookie duration: 397 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Probabilistic identifiers, Authentication-derived identifiers, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data more Cookie duration resets each session. Uses other forms of storage. View details | Privacy policylaunch Consent HUMAN Doesn't use cookies. Data collected and processed: Probabilistic identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data more View details | Privacy policylaunch Legitimate interesthelp_outline BLENDEE SRL Cookie duration: 366 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Authentication-derived identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data, User-provided data more Cookie duration resets each session. Uses other forms of storage. View details | Storage details | Privacy policylaunch Consent INNOVID LLC Cookie duration: 90 (days). Data collected and processed: Browsing and interaction data, Privacy choices, IP addresses, Device characteristics, Device identifiers, Non-precise location data more Cookie duration resets each session. View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline PAPIRFLY AS Doesn't use cookies. Data collected and processed: Device characteristics more View details | Privacy policylaunch Legitimate interesthelp_outline NEUSTAR, INC., A TRANSUNION COMPANY Cookie duration: 365 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, Authentication-derived identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data, User-provided data more Cookie duration resets each session. Uses other forms of storage. View details | Privacy policylaunch ConsentLegitimate interesthelp_outline SALESFORCE.COM, INC. Cookie duration: 180 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Authentication-derived identifiers, Device characteristics, Device identifiers, Non-precise location data, User-provided data more Cookie duration resets each session. Uses other forms of storage. View details | Privacy policylaunch Consent VERVE GROUP EUROPE GMBH Doesn't use cookies. Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Authentication-derived identifiers, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data, User-provided data more Uses other forms of storage. View details | Privacy policylaunch Consent OTTO (GMBH & CO KG) Cookie duration: 365 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, IP addresses, Device identifiers, User-provided data more Cookie duration resets each session. Uses other forms of storage. View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline ADOBE AUDIENCE MANAGER, ADOBE EXPERIENCE PLATFORM Cookie duration: 180 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, Authentication-derived identifiers, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data, User-provided data more Cookie duration resets each session. View details | Privacy policylaunch Consent LOCALSENSOR B.V. Doesn't use cookies. Data collected and processed: Privacy choices, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data more Uses other forms of storage. View details | Privacy policylaunch Consent ONLINE SOLUTION Cookie duration: 365 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data, User-provided data more Cookie duration resets each session. Uses other forms of storage. View details | Privacy policylaunch Consent RELAY42 NETHERLANDS B.V. Cookie duration: 730 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, IP addresses, Device characteristics, Device identifiers, User-provided data more View details | Storage details | Privacy policylaunch Consent GP ONE GMBH Cookie duration: Uses session cookies. Data collected and processed: Browsing and interaction data, Privacy choices, IP addresses, Device characteristics, Non-precise location data, User-provided data more Uses other forms of storage. View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline THE MEDIAGRID INC. Cookie duration: 365 (days). Data collected and processed: Browsing and interaction data, Privacy choices, Probabilistic identifiers, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data more Cookie duration resets each session. Uses other forms of storage. View details | Storage details | Privacy policylaunch Consent MINDTAKE RESEARCH GMBH Cookie duration: 180 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Probabilistic identifiers, IP addresses, Device characteristics, Device identifiers more Uses other forms of storage. View details | Privacy policylaunch Consent CINT AB Cookie duration: 730 (days). Data collected and processed: Browsing and interaction data, Privacy choices, IP addresses, Device characteristics, Device identifiers more View details | Privacy policylaunch Consent GOOGLE ADVERTISING PRODUCTS Cookie duration: 396 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Authentication-derived identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data, User-provided data more Uses other forms of storage. View details | Storage details | Privacy policylaunch ConsentLegitimate interesthelp_outline GFK SE Cookie duration: 730 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Authentication-derived identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data, User-provided data more Uses other forms of storage. View details | Privacy policylaunch Consent REVJET Cookie duration: 730 (days). Data collected and processed: Users’ profiles, Privacy choices, IP addresses, Device identifiers, Non-precise location data more Cookie duration resets each session. View details | Storage details | Privacy policylaunch Consent PROTECTED MEDIA LTD Doesn't use cookies. Data collected and processed: Browsing and interaction data, Probabilistic identifiers, IP addresses, Device characteristics, Device identifiers more View details | Privacy policylaunch Legitimate interesthelp_outline CLINCH LABS LTD Cookie duration: 730 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Probabilistic identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data more Cookie duration resets each session. View details | Privacy policylaunch ConsentLegitimate interesthelp_outline ORACLE DATA CLOUD - MOAT Doesn't use cookies. Data collected and processed: IP addresses, Non-precise location data more View details | Privacy policylaunch Legitimate interesthelp_outline HEARTS AND SCIENCE MÜNCHEN GMBH Cookie duration: 60 (days). Data collected and processed: IP addresses more Cookie duration resets each session. View details | Privacy policylaunch Consent AMAZON ADVERTISING Cookie duration: 396 (days). Data collected and processed: Browsing and interaction data, Users’ profiles, Privacy choices, Authentication-derived identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data more Cookie duration resets each session. Uses other forms of storage. View details | Storage details | Privacy policylaunch Consent MOLOCO, INC. Cookie duration: 730 (days). Data collected and processed: IP addresses, Device characteristics, Device identifiers, Non-precise location data more Cookie duration resets each session. Uses other forms of storage. View details | Privacy policylaunch ConsentLegitimate interesthelp_outline ADTRIBA GMBH Cookie duration: 730 (days). Data collected and processed: Browsing and interaction data, Privacy choices, Authentication-derived identifiers, IP addresses, Device characteristics, Device identifiers, Non-precise location data more Cookie duration resets each session. View details | Storage details | Privacy policylaunch Consent OBJECTIVE PARTNERS BV Cookie duration: 90 (days). Data collected and processed: Device identifiers more Cookie duration resets each session. View details | Storage details | Privacy policylaunch Consent ENSIGHTEN Cookie duration: 1825 (days). Data collected and processed: Browsing and interaction data, Privacy choices, IP addresses, Device characteristics, Device identifiers more Cookie duration resets each session. View details | Storage details | Privacy policylaunch Legitimate interesthelp_outline EBAY INC Cookie duration: 90 (days). Data collected and processed: Privacy choices, IP addresses, Device characteristics more View details | Storage details | Privacy policylaunch Consent HURRA COMMUNICATIONS GMBH Cookie duration: 366 (days). Data collected and processed: Authentication-derived identifiers, IP addresses, Device characteristics, Precise location data, Device identifiers, Non-precise location data more Cookie duration resets each session. View details | Storage details | Privacy policylaunch Consent Ad partners help_outline GSKINNER Privacy policylaunch Consent AKAMAI Privacy policylaunch Consent FACEBOOK Privacy policylaunch Consent AUNICA Privacy policylaunch Consent BOOKING.COM Privacy policylaunch Consent C3 METRICS Privacy policylaunch Consent IBM Privacy policylaunch Consent EVIDON Privacy policylaunch Consent CUBED Privacy policylaunch Consent OPTOMATON Privacy policylaunch Consent INTELLIAD Privacy policylaunch Consent ANALIGHTS Privacy policylaunch Consent DSTILLERY Privacy policylaunch Consent MEDIAMATH Privacy policylaunch Consent DMA INSTITUTE Privacy policylaunch Consent ZMS Privacy policylaunch Consent DENTSU AEGIS NETWORK Privacy policylaunch Consent IGNITION ONE Privacy policylaunch Consent OMNICOM MEDIA GROUP Privacy policylaunch Consent DIGISEG Privacy policylaunch Consent RESONATE Privacy policylaunch Consent SOJERN Privacy policylaunch Consent HAENSEL AMS Privacy policylaunch Consent BDSK HANDELS GMBH & CO. KG Privacy policylaunch Consent VIDEOLOGY Privacy policylaunch Consent TRADEDOUBLER AB Privacy policylaunch Consent TRUSTARC Privacy policylaunch Consent TRUEFFECT Privacy policylaunch Consent MARKETING SCIENCE CONSULTING GROUP, INC. Privacy policylaunch Consent DENTSU Privacy policylaunch Consent ESSENS Privacy policylaunch Consent TRAVEL DATA COLLECTIVE Privacy policylaunch Consent ADVOLUTION.CONTROL Privacy policylaunch Consent WIDESPACE Privacy policylaunch Consent LIFESTREET Privacy policylaunch Consent VIMEO Privacy policylaunch Consent BATCH MEDIA Privacy policylaunch Consent VODAFONE GMBH Privacy policylaunch Consent MAGNITE Privacy policylaunch Consent SCENESTEALER Privacy policylaunch Consent NETQUEST Privacy policylaunch Consent MANAGE.COM Privacy policylaunch Consent CLOUDFLARE Privacy policylaunch Consent HAVAS MEDIA FRANCE - DBI Privacy policylaunch Consent NETFLIX Privacy policylaunch Consent MACROMILL GROUP Privacy policylaunch Consent EBUILDERS Privacy policylaunch Consent APPLOVIN CORP. Privacy policylaunch Consent NANO INTERACTIVE Privacy policylaunch Consent FRACTIONAL MEDIA Privacy policylaunch Consent RACKSPACE Privacy policylaunch Consent LIFTOFF Privacy policylaunch Consent MSI-ACI Privacy policylaunch Consent ARRIVALIST Privacy policylaunch Consent NAVEGG Privacy policylaunch Consent ADMEDO Privacy policylaunch Consent KOCHAVA Privacy policylaunch Consent MOBITRANS Privacy policylaunch Consent ADEX Privacy policylaunch Consent IMPACT Privacy policylaunch Consent SPOTAD Privacy policylaunch Consent AARKI Privacy policylaunch Consent SFR Privacy policylaunch Consent CABLATO Privacy policylaunch Consent WAYSTACK Privacy policylaunch Consent TRESENSA Privacy policylaunch Consent ADLUDIO Privacy policylaunch Consent Accept all Confirm choices Close Catch the Latest Trends and Insights. Subscribe Now. Get cybersecurity news, magazines, market trends reports, Cyble research blogs, and more straight to your inbox. Name: Email Select your interest* The Cyber Express Newsletter & Magazine Cyble Products Demo Cyble Research Blogs Sign Up Terms of Service We do not sell or share your information with anyone.