thecyberexpress.com Open in urlscan Pro
2606:4700:20::681a:18a  Public Scan

Submitted URL: https://bit.ly/4aU6iKh
Effective URL: https://thecyberexpress.com/why-soft-skills-cybersecurity-superpower/?utm_campaign=Oktopost-2024-01+Advocate+Posts&utm_conte...
Submission: On January 15 via manual from US — Scanned from DE

Form analysis 9 forms found in the DOM

GET https://thecyberexpress.com/

<form action="https://thecyberexpress.com/" method="get" class="jeg_search_form" target="_top">
  <input name="s" class="jeg_search_input" placeholder="Search..." type="text" value="" autocomplete="off">
  <button aria-label="Search Button" type="submit" class="jeg_search_button btn"><i class="fa fa-search"></i></button>
</form>

GET https://thecyberexpress.com/

<form action="https://thecyberexpress.com/" method="get" class="jeg_search_form" target="_top">
  <input name="s" class="jeg_search_input" placeholder="Search..." type="text" value="" autocomplete="off">
  <button aria-label="Search Button" type="submit" class="jeg_search_button btn"><i class="fa fa-search"></i></button>
</form>

GET https://thecyberexpress.com/

<form action="https://thecyberexpress.com/" method="get" class="jeg_search_form" target="_top">
  <input name="s" class="jeg_search_input" placeholder="Search..." type="text" value="" autocomplete="off">
  <button aria-label="Search Button" type="submit" class="jeg_search_button btn"><i class="fa fa-search"></i></button>
</form>

POST https://thecyberexpress.com/wp-comments-post.php

<form action="https://thecyberexpress.com/wp-comments-post.php" method="post" id="commentform" class="comment-form">
  <p class="comment-notes"><span id="email-notes">Your email address will not be published.</span> <span class="required-field-message">Required fields are marked <span class="required">*</span></span></p>
  <p class="comment-form-comment"><label for="comment">Comment <span class="required">*</span></label> <textarea id="comment" name="comment" cols="45" rows="8" maxlength="65525" required="required"></textarea></p>
  <p class="comment-form-author"><label for="author">Name <span class="required">*</span></label> <input id="author" name="author" type="text" value="" size="30" maxlength="245" autocomplete="name" required="required"></p>
  <p class="comment-form-email"><label for="email">Email <span class="required">*</span></label> <input id="email" name="email" type="text" value="" size="30" maxlength="100" aria-describedby="email-notes" autocomplete="email" required="required">
  </p>
  <p class="comment-form-url"><label for="url">Website</label> <input id="url" name="url" type="text" value="" size="30" maxlength="200" autocomplete="url"></p>
  <p class="comment-form-cookies-consent"><input id="wp-comment-cookies-consent" name="wp-comment-cookies-consent" type="checkbox" value="yes"> <label for="wp-comment-cookies-consent">Save my name, email, and website in this browser for the next time
      I comment.</label></p>
  <p class="comment-form-privacy_policy">
    <label for="privacy_policy">Privacy Policy Agreement <span class="required">*</span></label>
    <input id="privacy_policy" name="privacy_policy" required="required" type="checkbox"> I agree to the Terms &amp; Conditions and <a href="https://thecyberexpress.com/privacy-statement/">Privacy Policy</a>.
  </p>
  <p class="comment-subscription-form"><input type="checkbox" name="subscribe_comments" id="subscribe_comments" value="subscribe" style="width: auto; -moz-appearance: checkbox; -webkit-appearance: checkbox;"> <label class="subscribe-label"
      id="subscribe-label" for="subscribe_comments">Notify me of follow-up comments by email.</label></p>
  <p class="comment-subscription-form"><input type="checkbox" name="subscribe_blog" id="subscribe_blog" value="subscribe" style="width: auto; -moz-appearance: checkbox; -webkit-appearance: checkbox;"> <label class="subscribe-label"
      id="subscribe-blog-label" for="subscribe_blog">Notify me of new posts by email.</label></p>
  <p class="form-submit"><input name="submit" type="submit" id="submit" class="submit" value="Post Comment"> <input type="hidden" name="comment_post_ID" value="53147" id="comment_post_ID">
    <input type="hidden" name="comment_parent" id="comment_parent" value="0">
  </p>
  <p style="display: none;"><input type="hidden" id="akismet_comment_nonce" name="akismet_comment_nonce" value="ac0251eba9"></p>
  <p style="display: none !important;"><label>Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_1" name="ak_js" value="1705335954733">
    <script>
      document.getElementById("ak_js_1").setAttribute("value", (new Date()).getTime());
    </script>
  </p>
</form>

GET https://thecyberexpress.com

<form action="https://thecyberexpress.com" method="get"><label class="screen-reader-text" for="cat">Categories</label><select name="cat" id="cat" class="postform" style="display: none;">
    <option value="-1">Select Category</option>
    <option class="level-0" value="54">Appointments</option>
    <option class="level-0" value="55">Budgets</option>
    <option class="level-0" value="680">Bug Bounty &amp; Rewards</option>
    <option class="level-0" value="50">Business News</option>
    <option class="level-0" value="44">Compliance</option>
    <option class="level-0" value="42">Cyber Essentials</option>
    <option class="level-0" value="48">Cyber Warfare</option>
    <option class="level-0" value="5677">Cybersecurity Awareness Month</option>
    <option class="level-0" value="1">Cybersecurity News</option>
    <option class="level-0" value="3089">Dark Web News</option>
    <option class="level-0" value="41">Data Breach News</option>
    <option class="level-0" value="3104">DDoS Attacks News</option>
    <option class="level-0" value="6225">Deepfake</option>
    <option class="level-0" value="49">Espionage</option>
    <option class="level-0" value="47">Features</option>
    <option class="level-0" value="39">Firewall Daily</option>
    <option class="level-0" value="1599">Gitex2022</option>
    <option class="level-0" value="45">Governance</option>
    <option class="level-0" value="4159">Hacker Claims</option>
    <option class="level-0" value="3078">Hacker News</option>
    <option class="level-0" value="40">Hacking News</option>
    <option class="level-0" value="2026">How to</option>
    <option class="level-0" value="62">Interviews</option>
    <option class="level-0" value="57">Learning &amp; Development</option>
    <option class="level-0" value="3953">Lockbit Ransomware News</option>
    <option class="level-0" value="265">Main Story</option>
    <option class="level-0" value="3077">Malware News</option>
    <option class="level-0" value="61">Market Reports</option>
    <option class="level-0" value="52">Mergers &amp; Aquisitions</option>
    <option class="level-0" value="53">Partnerships</option>
    <option class="level-0" value="63">Podcast</option>
    <option class="level-0" value="46">Policy Updates</option>
    <option class="level-0" value="1087">Press Release</option>
    <option class="level-0" value="71">Ransomware News</option>
    <option class="level-0" value="43">Regulations</option>
    <option class="level-0" value="58">Research</option>
    <option class="level-0" value="3094">Resources</option>
    <option class="level-0" value="60">Sponsored Content</option>
    <option class="level-0" value="51">Startups</option>
    <option class="level-0" value="4388">Threat Intelligence</option>
    <option class="level-0" value="4376">Threat Intelligence News</option>
    <option class="level-0" value="70">Vulnerabilities</option>
    <option class="level-0" value="3079">Vulnerability News</option>
    <option class="level-0" value="59">Whitepapers</option>
    <option class="level-0" value="56">Workforce</option>
  </select>
  <div class="chosen-container chosen-container-single" title="" id="cat_chosen" style="width: 345px;"><a class="chosen-single">
  <span>Select Category</span>
  <div><b></b></div>
</a>
    <div class="chosen-drop">
      <div class="chosen-search">
        <input class="chosen-search-input" type="text" autocomplete="off">
      </div>
      <ul class="chosen-results"></ul>
    </div>
  </div>
</form>

GET https://thecyberexpress.com/

<form action="https://thecyberexpress.com/" method="get" class="jeg_search_form" target="_top">
  <input name="s" class="jeg_search_input" placeholder="Search..." type="text" value="" autocomplete="off">
  <button aria-label="Search Button" type="submit" class="jeg_search_button btn"><i class="fa fa-search"></i></button>
</form>

POST #

<form action="#" data-type="login" method="post" accept-charset="utf-8">
  <h3>Welcome Back!</h3>
  <p>Login to your account below</p>
  <div class="form-message"></div>
  <p class="input_field">
    <input type="text" name="username" placeholder="Username" value="">
  </p>
  <p class="input_field">
    <input type="password" name="password" placeholder="Password" value="">
  </p>
  <p class="input_field remember_me">
    <input type="checkbox" id="remember_me" name="remember_me" value="true">
    <label for="remember_me">Remember Me</label>
  </p>
  <p class="submit">
    <input type="hidden" name="action" value="login_handler">
    <input type="hidden" name="jnews_nonce" value="d854b28fbb">
    <input type="submit" name="jeg_login_button" class="button" value="Log In" data-process="Processing . . ." data-string="Log In">
  </p>
  <div class="bottom_links clearfix">
    <a href="#jeg_forgotform" class="jeg_popuplink forgot">Forgotten Password?</a>
  </div>
</form>

POST #

<form action="#" data-type="forgot" method="post" accept-charset="utf-8">
  <h3>Retrieve your password</h3>
  <p>Please enter your username or email address to reset your password.</p>
  <div class="form-message"></div>
  <p class="input_field">
    <input type="text" name="user_login" placeholder="Your email or username" value="">
  </p>
  <div class="g-recaptcha" data-sitekey=""></div>
  <p class="submit">
    <input type="hidden" name="action" value="forget_password_handler">
    <input type="hidden" name="jnews_nonce" value="d854b28fbb">
    <input type="submit" name="jeg_login_button" class="button" value="Reset Password" data-process="Processing . . ." data-string="Reset Password">
  </p>
  <div class="bottom_links clearfix">
    <a href="#jeg_loginform" class="jeg_popuplink"><i class="fa fa-lock"></i> Log In</a>
  </div>
</form>

POST #

<form action="#" method="post" accept-charset="utf-8">
  <h3>Add New Playlist</h3>
  <div class="form-message"></div>
  <div class="form-group">
    <p class="input_field">
      <input type="text" name="title" placeholder="Playlist Name" value="">
    </p>
    <p class="input_field">
      <select name="visibility">
        <option disabled="" selected="selected" value="">- Select Visibility -</option>
        <option value="public">Public</option>
        <option value="private">Private</option>
      </select>
    </p>
    <div class="submit">
      <input type="hidden" name="type" value="create_playlist">
      <input type="hidden" name="action" value="playlist_handler">
      <input type="hidden" name="post_id" value="">
      <input type="hidden" name="jnews-playlist-nonce" value="993deb7e45">
      <input type="submit" name="jeg_save_button" class="button" value="Save" data-process="Processing . . ." data-string="Save">
    </div>
  </div>
</form>

Text Content

#1 Trending Cybersecurity News & Magazine


Monday, January 15, 2024
We are Hiring!


 * MagazineDownload
 * Firewall Daily
    * All
    * Bug Bounty & Rewards
    * Dark Web News
    * Data Breach News
    * Hacking News
    * Ransomware News
    * Vulnerabilities
   
   
   DATABASE SALE ON DARK WEB PUTS GEICO IN THE ATTACKERS CROSSHAIRS AGAIN
   
   
   TCE EXCLUSIVE: MCDONALD’S DATA BREACH 2024, A CONTINUATION OF CYBERSECURITY
   DILEMMAS
   
   
   TURA SCANDINAVIA AB ENCOUNTERS ANOTHER CYBERATTACK FOLLOWING INTRUSION IN
   DECEMBER
   
   
   NONAME TARGETS MULTIPLE WEBSITES IN LITHUANIA, BLAMES IT FOR AIDING UKRAINE
   
   
   NAVIGATING DIGITAL CHAOS: TAMING RISKS IN THE AGE OF GENERATIVE AI
   
   
   GACHA GAMES DECODED: CONTROVERSIES, PSYCHOLOGY, COPING
   
   
   BEYOND THE FIREWALL: WHY SOFT SKILLS ARE CYBERSECURITY’S NEW SUPERPOWER
   
   
   AI-DRIVEN CYBERSECURITY: TRANSFORMING DEFENSE STRATEGIES FOR THE DIGITAL AGE
   
   
   BEYOND CONVENIENCE: CAN YOU TRUST YOUR SMART HOME?
   
   
   
   
   TRENDING TAGS
   
    * blackbyte ransomware
    * Ransomware
    * lapsus$ ransomware
    * Apple
    * Apple vulnerability

 * Essentials
    * All
    * Compliance
    * Governance
    * Policy Updates
    * Regulations
   
   
   GREECE PLANS NATIONAL CYBERSECURITY AUTHORITY TO COMBAT RISING HACKER THREATS
   
   
   RETHINKING AI FOR CYBERSECURITY: THE UK & US REVEALS NEW GUIDELINES FOR AI
   SECURITY
   
   
   CYBER INSURANCE AND REAL-TIME THREAT DASHBOARD TO MEND THE GAPS IN NEAR
   FUTURE
   
   
   PLEDGE TO STOP RANSOM PAYMENT AWAITS CONSENSUS FROM ALL MEMBERS OF THE CRI
   
   
   BIDEN ADMINISTRATION’S AI DIRECTIVE: A BLUEPRINT FOR ETHICAL USE AND ENHANCED
   CYBERSECURITY
   
   
   TOWARDS CYBER RESILIENCE: A DATA-CENTRIC APPROACH TO SECURITY
   
   
   CYBLE PARTNER NETWORK GROWCON 2023: UNITING CYBERSECURITY LEADERS
   
   
   WHAT IS GRC (GOVERNANCE, RISK & COMPLIANCE): A BEGINNER’S GUIDE
   
   
   NEW YORK STATE EDUCATION DEPARTMENT BANS FACIAL RECOGNITION SCANS IN SCHOOLS
   
   
   * Regulations
   * Compliance
   * Governance
   * Policy Updates
 * Features
   * Cyber Warfare
   * Espionage
   * Workforce
     * Learning & Development
 * Business
    * All
    * Appointments
    * Budgets
    * Mergers & Aquisitions
    * Partnerships
    * Press Release
    * Startups
   
   
   2024 OUTLOOK: EMERGING TRENDS SHAPING PHYSICAL SECURITY
   
   
   CYBLE’S LATEST PRODUCT – ODIN – ROLLS OUT SERVICE BANNER SEARCH FEATURE 
   
   
   Y COMBINATOR SPOTLIGHTS AI-POWERED THREAT INTELLIGENCE PLATFORM CYBLE AMONG
   TOP STARTUPS
   
   
   WORLD CYBERCON INDIA 2023, SECOND EDITION: A TRIUMPH IN ADVOCATING A SECURE
   DIGITAL TERRAIN
   
   
   INSUREMO PARTNERS WITH CYBLE TO REVOLUTIONIZE CYBER INSURANCE WITH REAL-TIME
   THREAT INTELLIGENCE
   
   
   COUNTDOWN TO TIMEAI SUMMIT 2023: UNVEILING THE FUTURE OF ARTIFICIAL
   INTELLIGENCE IN DUBAI
   
   
   THE EMERGING TECH SUMMIT – SAUDI ARABIA 2023
   
   
   PRIORITIZING BUSINESS CYBERSECURITY PLANS DURING MERGERS AND ACQUISITIONS
   
   
   TIMEAI SUMMIT IS UNITING TECH GIANTS AND VISIONARIES IN DUBAI TO SHAPE THE
   FUTURE OF AI
   
   
   * Startups
   * Mergers & Aquisitions
   * Partnerships
   * Appointments
   * Budgets
   * Research
     * Whitepapers
     * Sponsored Content
     * Market Reports
   * Interviews
     * Podcast
 * EventsCyberCon
   * World CyberCon 3rd Edition – META
   * World CyberCon India 2023
   *  Cyber Security Webinar
   * Endorsed Events
 * ProductsTools
   * Cyble Vision
   * Cyble Hawk (LEA, Govt.)
   * Am I Breached
   * Cyble Odin

No Result
View All Result
 * MagazineDownload
 * Firewall Daily
    * All
    * Bug Bounty & Rewards
    * Dark Web News
    * Data Breach News
    * Hacking News
    * Ransomware News
    * Vulnerabilities
   
   
   DATABASE SALE ON DARK WEB PUTS GEICO IN THE ATTACKERS CROSSHAIRS AGAIN
   
   
   TCE EXCLUSIVE: MCDONALD’S DATA BREACH 2024, A CONTINUATION OF CYBERSECURITY
   DILEMMAS
   
   
   TURA SCANDINAVIA AB ENCOUNTERS ANOTHER CYBERATTACK FOLLOWING INTRUSION IN
   DECEMBER
   
   
   NONAME TARGETS MULTIPLE WEBSITES IN LITHUANIA, BLAMES IT FOR AIDING UKRAINE
   
   
   NAVIGATING DIGITAL CHAOS: TAMING RISKS IN THE AGE OF GENERATIVE AI
   
   
   GACHA GAMES DECODED: CONTROVERSIES, PSYCHOLOGY, COPING
   
   
   BEYOND THE FIREWALL: WHY SOFT SKILLS ARE CYBERSECURITY’S NEW SUPERPOWER
   
   
   AI-DRIVEN CYBERSECURITY: TRANSFORMING DEFENSE STRATEGIES FOR THE DIGITAL AGE
   
   
   BEYOND CONVENIENCE: CAN YOU TRUST YOUR SMART HOME?
   
   
   
   
   TRENDING TAGS
   
    * blackbyte ransomware
    * Ransomware
    * lapsus$ ransomware
    * Apple
    * Apple vulnerability

 * Essentials
    * All
    * Compliance
    * Governance
    * Policy Updates
    * Regulations
   
   
   GREECE PLANS NATIONAL CYBERSECURITY AUTHORITY TO COMBAT RISING HACKER THREATS
   
   
   RETHINKING AI FOR CYBERSECURITY: THE UK & US REVEALS NEW GUIDELINES FOR AI
   SECURITY
   
   
   CYBER INSURANCE AND REAL-TIME THREAT DASHBOARD TO MEND THE GAPS IN NEAR
   FUTURE
   
   
   PLEDGE TO STOP RANSOM PAYMENT AWAITS CONSENSUS FROM ALL MEMBERS OF THE CRI
   
   
   BIDEN ADMINISTRATION’S AI DIRECTIVE: A BLUEPRINT FOR ETHICAL USE AND ENHANCED
   CYBERSECURITY
   
   
   TOWARDS CYBER RESILIENCE: A DATA-CENTRIC APPROACH TO SECURITY
   
   
   CYBLE PARTNER NETWORK GROWCON 2023: UNITING CYBERSECURITY LEADERS
   
   
   WHAT IS GRC (GOVERNANCE, RISK & COMPLIANCE): A BEGINNER’S GUIDE
   
   
   NEW YORK STATE EDUCATION DEPARTMENT BANS FACIAL RECOGNITION SCANS IN SCHOOLS
   
   
   * Regulations
   * Compliance
   * Governance
   * Policy Updates
 * Features
   * Cyber Warfare
   * Espionage
   * Workforce
     * Learning & Development
 * Business
    * All
    * Appointments
    * Budgets
    * Mergers & Aquisitions
    * Partnerships
    * Press Release
    * Startups
   
   
   2024 OUTLOOK: EMERGING TRENDS SHAPING PHYSICAL SECURITY
   
   
   CYBLE’S LATEST PRODUCT – ODIN – ROLLS OUT SERVICE BANNER SEARCH FEATURE 
   
   
   Y COMBINATOR SPOTLIGHTS AI-POWERED THREAT INTELLIGENCE PLATFORM CYBLE AMONG
   TOP STARTUPS
   
   
   WORLD CYBERCON INDIA 2023, SECOND EDITION: A TRIUMPH IN ADVOCATING A SECURE
   DIGITAL TERRAIN
   
   
   INSUREMO PARTNERS WITH CYBLE TO REVOLUTIONIZE CYBER INSURANCE WITH REAL-TIME
   THREAT INTELLIGENCE
   
   
   COUNTDOWN TO TIMEAI SUMMIT 2023: UNVEILING THE FUTURE OF ARTIFICIAL
   INTELLIGENCE IN DUBAI
   
   
   THE EMERGING TECH SUMMIT – SAUDI ARABIA 2023
   
   
   PRIORITIZING BUSINESS CYBERSECURITY PLANS DURING MERGERS AND ACQUISITIONS
   
   
   TIMEAI SUMMIT IS UNITING TECH GIANTS AND VISIONARIES IN DUBAI TO SHAPE THE
   FUTURE OF AI
   
   
   * Startups
   * Mergers & Aquisitions
   * Partnerships
   * Appointments
   * Budgets
   * Research
     * Whitepapers
     * Sponsored Content
     * Market Reports
   * Interviews
     * Podcast
 * EventsCyberCon
   * World CyberCon 3rd Edition – META
   * World CyberCon India 2023
   *  Cyber Security Webinar
   * Endorsed Events
 * ProductsTools
   * Cyble Vision
   * Cyble Hawk (LEA, Govt.)
   * Am I Breached
   * Cyble Odin


No Result
View All Result
No Result
View All Result


Home Features


BEYOND THE FIREWALL: WHY SOFT SKILLS ARE CYBERSECURITY’S NEW SUPERPOWER


TRANSLATING TECHNICAL JARGON INTO PLAIN LANGUAGE IS ESSENTIAL FOR INFORMING
NON-TECHNICAL STAKEHOLDERS AND FACILITATING INFORMED DECISIONS.

by Avantika Chopra
January 13, 2024
in Features, Firewall Daily
0

615
SHARES
3.4k
VIEWS
Share on LinkedInShare on Twitter



In a domain traditionally lauded for its technical prowess, the emergence of
soft skills as a critical factor might seem counterintuitive. Yet, as cyber
threats continue to evolve in sophistication, industry experts are acknowledging
the indispensable role these skills play.

Cybersecurity is no longer solely about firewalls and encryption. It’s a
critical defense against sophisticated attacks that exploit human
vulnerabilities. As technology intertwines more deeply with daily life, the
interconnectedness of systems amplifies the impact of such attacks.


YOU MIGHT ALSO LIKE


ANONYMOUS COLLECTIVE LAUNCHES CYBERATTACK ON BAHRAIN OVER YEMEN AIRSTRIKES


DATABASE SALE ON DARK WEB PUTS GEICO IN THE ATTACKERS CROSSHAIRS AGAIN


TCE EXCLUSIVE: MCDONALD’S DATA BREACH 2024, A CONTINUATION OF CYBERSECURITY
DILEMMAS




Protecting against these threats demands a comprehensive approach that includes
not only technical measures but also education, awareness, and the development
of strong human-centric security practices.

Let’s lay the groundwork with a simple hypothetical scenario.



Adam, a cybersecurity analyst with impressive technical expertise, found a
vulnerability in the company’s network infrastructure with the potential to
expose sensitive client data if exploited.

However, Adam struggled to streamline his technical findings into a
non-technical format. His inability to convey the severity of the vulnerability
to key decision-makers led to the dismissal of the issue as a routine technical
glitch, assuming it could wait for a more convenient time to address.

In the following weeks, the overlooked security flaw was exploited by a cyber
adversary, resulting in a data breach that compromised sensitive customer
information. The fallout was immediate and damaging loss of customer trust,
legal repercussions, and a significant blow to the company’s reputation.

A cybersecurity analyst, brilliant with code but lacking in communication
skills, failed to effectively explain a critical security update to key
decision-makers. His lack of effective communication and soft skills hindered
his ability to convey the urgency of the situation, leading to dire consequences
that could have been mitigated with clearer, more persuasive communication.

While the above example might slightly overstate the situation, it does reflect
a significant transformation in the cybersecurity sector. Although technical
skills are indispensable for the protection of digital systems, they alone are
increasingly inadequate to address the complexities of modern cyber threats.


WHAT ARE SOFT SKILLS IN CYBERSECURITY?

Soft skills, also known as interpersonal or people skills, encompass a
collection of personal attributes and qualities that empower individuals to
engage effectively in various personal and professional scenarios.

Unlike technical or hard skills, which are specific to a particular job and
often tied to one’s expertise in a particular domain, soft skills have gained
increasing importance in cybersecurity. They work in tandem with technical
proficiency to establish more robust defenses and responses to cyber threats.

Field Chief Information Security Officer (CISO) for the Public Sector at
Presidio, Dan Lohrmann, stressed to The Cyber Express the pivotal role of soft
skills in cybersecurity. According to him, strong soft skills play a crucial
role in facilitating effective teamwork and coordinated communication during
emergency incidents.

“In an emergency incident, strong soft skills enable a team to work together
well and communicate in coordinated ways.  You don’t want to be meeting someone
in person for the first time during a major incident or misunderstand
directions, expected actions, etc. Strong soft skills build trust and better
outcomes,” stated Lohrmann.

However, before diving into why soft skills are essential in cybersecurity it is
essential to understand the key soft skills for cybersecurity professionals and
what they are.

COMMUNICATION SKILLS

In cybersecurity, the ability to convey complex technical concepts in clear,
understandable language is crucial. Professionals must translate jargon-heavy
security information into layman’s terms for non-technical stakeholders,
enabling informed decision-making and support.

Communication is key, and this principle is equally important in cyberspace.

The Equifax data breach in 2017, a significant event in cybersecurity history,
highlights the critical importance of communication in cyberspace. This breach
exposed the personal information of nearly 150 million Americans, primarily due
to the failure to patch a known software vulnerability. Despite the availability
of a patch, internal miscommunication and bureaucratic delays between IT and
security teams led to its non-implementation.

“Ability to communicate technical details in a clear and concise manner is a
critical communication skill that should be innate. Comprehension of problem
statements and addressing those for easily understandable solutions is important
to team success,” Senior Research and Intelligence Manager at Cyble told The
Cyber Express

CRITICAL THINKING

The capacity to analyze, evaluate, and solve complex problems or challenges by
using logical and creative thinking. Critical thinking skills are vital for
making informed decisions and adapting to various situations.

Cybersecurity experts must possess acute critical thinking skills to recognize
and analyze potential threats. This includes identifying subtle indicators of
phishing attempts, assessing risk scenarios, and swiftly making informed
decisions under pressure. Critical thinking allows professionals to anticipate
vulnerabilities and proactively implement security measures to mitigate risks.

PROBLEM-SOLVING

The skill of identifying issues, evaluating possible solutions, and selecting
the most appropriate course of action to resolve problems or overcome obstacles.
Problem-solving skills can play a crucial role in resolving cybersecurity
incidents efficiently.

The cybersecurity space is dynamic and constantly evolving. Strong
problem-solving skills enable professionals to adapt to emerging threats, devise
innovative strategies, and respond effectively to security breaches. This
involves thinking on one’s feet, creatively finding solutions, and implementing
measures to contain and resolve incidents efficiently.

Having individuals on the team who possess not only technical expertise but also
the ability to extract valuable insights from past incidents and apply them to
current situations is of great importance. It highlights that safeguarding the
future is as crucial as defending against present threats.

Cyble Senior Reseracher also highlighted the importance of Conflict Resolution
Skills. “In a cybersecurity environment, conflicts may arise, the skill to
mitigate the conflicts and come to a resolution is a skill that can be developed
through experience and practice under good mentors in an organization,” he told
The Cyber Express.

ACTIVE LISTENING

Lack of active listening can lead to ignoring critical feedback from team
members, as seen in various incidents where employee concerns about security
vulnerabilities were overlooked.

Building trust and rapport with stakeholders—whether they’re clients,
colleagues, or end-users—is facilitated through active listening. Understanding
their concerns, challenges, and security needs helps in tailoring solutions that
address specific vulnerabilities.

By actively listening to feedback and concerns, cybersecurity professionals can
effectively align security measures with organizational goals and user
requirements.

EMPATHY

Empathy in cybersecurity refers to the ability of cybersecurity professionals to
understand and consider the perspectives, emotions, and experiences of both
colleagues and end-users affected by security measures or incidents.

While empathy may not be the first trait that comes to mind in the context of
cybersecurity, it plays a vital role in various aspects of the field.

Professionals who practice empathy are better equipped to create user-friendly
security solutions, provide support during incidents, and foster a culture of
security awareness and cooperation.

TEAMWORK AND COLLABORATION

This skill involves the ability to work effectively with others, both within and
outside the organization, to achieve common goals. It includes communicating
clearly, sharing responsibilities, and integrating diverse perspectives and
skills. Teamwork is paramount in cybersecurity, and its effectiveness in
preventing cyberattacks.

ADAPTABILITY AND FLEXIBILITY

The rapid shift to remote work, especially post 2020 led to increased phishing
attacks, showing the need for adaptable security strategies. Being flexible in
security strategies is crucial to staying ahead of cybercriminals.

Every organization’s security posture is different, and professionals may
require coaching on adaptability to perform their roles optimally in a new
environment.

ATTENTION TO DETAIL

Minor oversights in code or security protocols have led to numerous breaches. A
prime example of this is the Heartbleed bug discovered in 2014. This bug was a
security flaw in the OpenSSL cryptography library, which is widely used for the
SSL/TLS protocol to secure internet communication.

The oversight in OpenSSL allowed attackers to read sensitive information from
the memory of systems protected by the vulnerable versions of OpenSSL, leading
to the exposure of private keys, usernames, passwords, and other sensitive data.

Attention to detail is essential in code development and security protocols to
prevent such vulnerabilities.

LEADERSHIP AND MANAGEMENT SKILLS

Leadership plays a pivotal role in establishing a security-focused culture.
Failures in this aspect have been at the root of many data breaches, emphasizing
the need for strong leadership and management in cybersecurity teams.

EMOTIONAL INTELLIGENCE

Ransomware attacks often rely on psychological tactics. Having emotional
intelligence enables professionals to better understand and defend against these
tactics, enhancing cybersecurity resilience.

In the context of ransomware, attackers frequently use tactics designed to
create urgency, fear, or confusion, prompting victims to act impulsively, such
as by paying a ransom.

In such situations, cybersecurity professionals with high EI can better
understand these manipulative tactics, allowing them to educate and prepare
users and organizations to respond appropriately.

ETHICAL JUDGMENT AND INTEGRITY

Insider threats, often stemming from ethical lapses, have been responsible for
corporate espionage cases. Ethical judgment and integrity are critical in
maintaining trust and security within organizations.

Honesty towards designated portfolio stakeholders and maintaining highest moral
standards is critical to securing any enterprise.

CONTINUOUS LEARNING AND CURIOSITY

The evolving nature of cyber threats necessitates continuous learning and
curiosity among cybersecurity experts. Staying updated and adaptive is essential
to effectively combat emerging risks.

Emphasizing the importance of staying informed and adaptable in the field of
cybersecurity, Lohrmann stressed the need for a proactive approach in keeping
abreast of the latest technological advancements and hacker tactics.

“Being curious with a thirst for knowledge and hunger to learn more. We need to
be life-long learners with tech changing so rapidly. Also, good communicator –
with the more modes the better (writing, speaking, listening). Also, humble but
bold at the same time. Don’t be afraid to ask questions,” he said.


DECODING CYBERSECURITY DECISIONS

Tim Pappa, a certified former FBI profiler with expertise in cyber deception and
online influence from the Behavioral Analysis Unit, highlighted the importance
of naturalistic decision-making in cybersecurity during his discussion with The
Cyber Express. He drew upon Gary Klein’s research to emphasize his points.

“There have been a few researchers over the past several decades who have
developed various models of naturalistic decision making. Gary Klein, for
instance, explored how fire commanders make crisis decisions, uncovering that
many rely on what he termed the ‘recognition-primed model.’ This approach is
rooted in experiential learning, allowing for quick decisions that seem
instinctive but are actually informed by past experience and an understanding of
what’s likely to succeed,” Pappa said.

Gary Klein’s study, titled “Rapid Decision Making on the Fire Ground,”
investigates how fire commanders make quick decisions during emergencies. The
research introduces the “Recognition-Primed Decision” (RPD) model, demonstrating
that these rapid decisions are informed by commanders’ extensive experience and
knowledge.

This study significantly contributes to the understanding of naturalistic
decision-making in critical situations. This is particularly relevant to the
cybersecurity sector, which frequently demands rapid and high-pressure
decision-making.

Pappa suggests that this model can be applied to cybersecurity, considering the
dynamic nature of human lives and the complex variables influencing
decision-making.

“Naturalistic decision-making challenges traditional models by recognizing the
dynamic nature of human lives and decisions. It understands that decisions are
influenced by various unknown factors in a person’s life, like relationships and
organizational constraints, and these factors can change over time,” he added.

“In criminology and cybersecurity, the distinction isn’t always black and white.
It raises questions about whether automated software can identify and follow
patterns in a cyber threat actor’s campaign over time and if threat actors
consider these factors when exploiting vulnerabilities in network defense, he
added further.

Pappa argues for a focus on soft skills, recognizing the necessity for a more
humanistic model in cybersecurity. This approach acknowledges the diverse
motivations and circumstances of individuals, including cybercriminals.

BRIDGING THE SOFT SKILLS GAP IN CYBERSECURITY

The recognition of soft skills’ significance in cybersecurity is on the rise
within the cyber sector. According to the ISACA’s State of Cybersecurity 2023
report, soft skills have emerged as a significant gap in the cybersecurity
field, highlighting that 54% of cybersecurity professionals rated soft skills as
the greatest skills gap.

These skills are not merely additional qualities but are becoming central in the
complex digital space, especially with the advent of AI and evolving global
regulations.

The top soft skills identified as crucial for security professionals include
communication, critical thinking, problem-solving, teamwork, and attention to
detail.

The rise of social engineering attacks—a tactic that preys on human psychology
and exploits interpersonal vulnerabilities rather than technical weaknesses is a
growing concern. With AI playing a bigger role, these attacks are only going to
get harder to detect.

These attacks often leverage trust, persuasion, and psychological manipulation
to bypass traditional security measures. Phishing emails, pretexting phone
calls, and impersonation scams are common examples of social engineering
techniques.

According to the 2023 Ponemon Institute’s Cost of Phishing Study, a staggering
83% of organizations experienced a phishing attack in the past year. A key
finding of this study is the identification of poor employee awareness and
training as a major contributing factor to these incidents.

No firewall or encryption can fully protect against an unsuspecting employee
falling victim to a well-crafted phishing email or a convincing social
engineering ploy.

Cyber defenders now need a holistic skill set that includes not just technical
prowess but also strong communication, critical thinking, and awareness of human
behavior.


IDENTIFYING AND CULTIVATING SOFT SKILLS CHALLENGES

The challenges in identifying and developing soft skills within the
cybersecurity workforce are multifaceted, as highlighted by both industry
insights and academic research.

Cyble’s Senior Researcher observations align closely with findings from broader
industry studies, shedding light on the nuanced difficulties organizations face
in this area.

He points out that the common assessment criteria in cybersecurity hirings are
heavily focused towards technical skills, often based on certifications.

This approach leaves the assessment of soft skills to team leads or managers,
which can burden the organizational structure. The need for a more comprehensive
and trait-specific soft skills hiring assessment model is crucial for
organizational success.

This observation is substantiated by an ISACA report, which shows that while
technical skills like identity and access management and cloud computing are
heavily sought after, soft skills such as communication and critical thinking
are not emphasized to the same extent, despite their recognized importance.

According to the report, the most significant skill gaps identified in today’s
cybersecurity professionals include soft skills (55%), followed by cloud
computing expertise (47%), knowledge in security controls (35%), and abilities
in coding (30%) and software development (30%).

Additionally, Cyble’s Senior Researcher discusses the ‘Talent Crunch & Skill
Combo’ issue, highlighting the rarity of finding cybersecurity professionals
with both technical and soft skills.

“The industry as it is having a critical shortage of skilled cybersecurity
professionals and its rare to find both technical and soft skills, hence
organizations have to make do by compromising on either of them and more so on
soft skills to keep up with business operations pressure,” he told The Cyber
Express.

This forces organizations to compromise, often on soft skills, to maintain
business operations. This is echoed in the broader industry context where 59% of
cybersecurity leaders say their teams are understaffed, leading to a focus on
filling roles with a primary emphasis on technical skills.

The impact of strong soft skills on cybersecurity risk management and incident
response efforts is significant. Cyble’s Senior Researcher mention of the need
for cybersecurity professionals to evolve their focus beyond IT security to
encompass risk management, governance, and compliance is particularly relevant.

As cybersecurity challenges intensify, effective collaboration with various
stakeholders becomes critical for audits, legal compliance, business risk
assessments, and business continuity planning, necessitating strong soft skills.

Dan Lohrmann, addressing challenges in the modern work environment, particularly
emphasizes the difficulties posed by a shift to a largely virtual setting.

Speaking to The Cyber Express, he notes, “Moving meetings and so much
conversation online makes it hard to really know someone well. We used to be
almost 100% in-person, and we are not going back to those days, but it is harder
than ever to learn by osmosis (just being around people).”

This shift has particularly affected the learning and development of younger
workers. Lohrmann highlights their unique challenge, stating, “Younger workers
can’t see their senior colleagues ‘in-action’ as much – unless the inclusion is
very intentional, which is much harder to do consistently on a wide scale.”

His observations point to the need for more deliberate and structured approaches
to mentoring and knowledge sharing in remote or hybrid work environments. This
is crucial for fostering the same level of learning and professional development
that was more naturally facilitated in traditional, in-person settings.


SOFT SKILLS IN THE FUTURE OF CYBERSECURITY

The future of cybersecurity is increasingly recognizing the vital role of soft
skills. As noted by experts, these skills are becoming crucial due to the
evolving nature of cyber threats and the integration of technologies like AI and
GenAI.

“As cybersecurity challenges intensify, so would the collaboration with various
stakeholder to maintain flow of information for audits, legal, Business Risk
Assessment, and BCP planning and management. Hence, the soft skills will be more
than ever essential for maintaining team collaborations and high level of
security in the organization,” Cyble Senior Researcher adds.

While technical skills remain a cornerstone in cybersecurity, the development
and integration of soft skills into the workforce are vital for addressing
current and future challenges in the field. The concept of ‘human-centric AI’
highlights the need for skills that distinguish humans from machines.

“The ‘human-centric’ part is all about building those soft skills that
differentiate humans from robots and machines. I only see the importance of
building stronger soft skills growing in the years ahead within cybersecurity,”
concluded Lohrmann while stressing upon the need for soft skiils, especially
with the way AI is being integrated in day-to-day life, and the tasks involving
cybersecurity.

Moreover, organizations need to adapt their hiring and training strategies to
create a more balanced skill set in their cybersecurity teams. This balanced
approach is essential for the overall effectiveness and resilience of
cybersecurity operations within organizations.

Professionals with strong interpersonal skills can play a pivotal role in
educating and empowering teams to recognize and resist these attacks. Training
programs focused on cybersecurity awareness, incident response, and social
engineering simulations can significantly reduce the susceptibility of
individuals within an organization.

Furthermore, cybersecurity professional’s adept at understanding and
communicating across departments—bridging the gap between technical teams,
management, and end-users—can implement comprehensive security protocols and
create a culture of vigilance against social engineering attacks.

In essence, the evolution of cybersecurity demands a shift towards recognizing
the human element as a critical factor in defense. Combining technical expertise
with strong interpersonal skills is the new frontier in fortifying organizations
against the ever-growing sophistication of social engineering threats.


SHARE THIS:

 * Click to share on LinkedIn (Opens in new window)
 * Click to share on Reddit (Opens in new window)
 * Click to share on Twitter (Opens in new window)
 * Click to share on Facebook (Opens in new window)
 * More
 * 

 * Click to email a link to a friend (Opens in new window)
 * Click to share on WhatsApp (Opens in new window)
 * 


RELATED

STRENGTHENING HEALTHCARE SECURITY: CISA’S CYBERSECURITY TOOLKIT UNVEILED

The CISA Cybersecurity Toolkit For Healthcare and Public Health is a
collaborative effort between key players in the cybersecurity and healthcare
domains.

October 27, 2023

In "Cybersecurity News"

TAIWAN RAMPS UP CYBERSECURITY AMID RISING THREATS

Taiwan is intensifying efforts to fortify Taiwan cybersecurity defenses against
a potential full-blown cyberattack from China. As fears mount over the
vulnerability of Taiwan's financial system to advanced hacks, government
officials and financial institutions in Taipei are collaborating with US
cybersecurity experts to enhance their digital resilience. Taiwan Cybersecurity:
Alarming…

December 12, 2023

In "Cybersecurity News"

EMERGING TRENDS AND CHALLENGES IN CYBERSECURITY: INSIGHTS FROM ABUL KALAM AZAD

In a comprehensive exploration of the dynamic cybersecurity terrain, Abul Kalam
Azad, Head of Information Security at Eastern Bank, shares invaluable insights
in an interview with Augustin Kurian, Editor-in-Chief of The Cyber Express. With
over two decades of expertise in IT audit, risk management, and cybersecurity,
Azad illuminates the cybersecurity…

December 16, 2023

In "Firewall Daily"


Tags: cybersecuritySoft SkillsSoft Skills in CYbersecurityThe Cyber ExpressThe
Cyber Express News


Previous Post


AI-DRIVEN CYBERSECURITY: TRANSFORMING DEFENSE STRATEGIES FOR THE DIGITAL AGE

Next Post


GACHA GAMES DECODED: CONTROVERSIES, PSYCHOLOGY, COPING


AVANTIKA CHOPRA

Associate Editor, The Cyber Express




RELATED POSTS

Dark Web News


DATABASE SALE ON DARK WEB PUTS GEICO IN THE ATTACKERS CROSSHAIRS AGAIN

by Ashish Khaitan
January 15, 2024
Dark Web News


TCE EXCLUSIVE: MCDONALD’S DATA BREACH 2024, A CONTINUATION OF CYBERSECURITY
DILEMMAS

by Editorial
January 15, 2024
Firewall Daily


TURA SCANDINAVIA AB ENCOUNTERS ANOTHER CYBERATTACK FOLLOWING INTRUSION IN
DECEMBER

by Ashish Khaitan
January 15, 2024
Firewall Daily


NONAME TARGETS MULTIPLE WEBSITES IN LITHUANIA, BLAMES IT FOR AIDING UKRAINE

by Ashish Khaitan
January 15, 2024
Features


NAVIGATING DIGITAL CHAOS: TAMING RISKS IN THE AGE OF GENERATIVE AI

by Editorial
January 14, 2024


Next Post


GACHA GAMES DECODED: CONTROVERSIES, PSYCHOLOGY, COPING


LEAVE A REPLY CANCEL REPLY

Your email address will not be published. Required fields are marked *

Comment *

Name *

Email *

Website

Save my name, email, and website in this browser for the next time I comment.

Privacy Policy Agreement * I agree to the Terms & Conditions and Privacy Policy.

Notify me of follow-up comments by email.

Notify me of new posts by email.





Δ

This site uses Akismet to reduce spam. Learn how your comment data is processed.


LATEST ISSUE IS OUT. SUBSCRIBE NOW







Follow Us On Google News




LATEST CYBER NEWS

Dark Web News


DATABASE SALE ON DARK WEB PUTS GEICO IN THE ATTACKERS CROSSHAIRS AGAIN

January 15, 2024
Dark Web News


TCE EXCLUSIVE: MCDONALD’S DATA BREACH 2024, A CONTINUATION OF CYBERSECURITY
DILEMMAS

January 15, 2024
Firewall Daily


TURA SCANDINAVIA AB ENCOUNTERS ANOTHER CYBERATTACK FOLLOWING INTRUSION IN
DECEMBER

January 15, 2024
Firewall Daily


NONAME TARGETS MULTIPLE WEBSITES IN LITHUANIA, BLAMES IT FOR AIDING UKRAINE

January 15, 2024




CATEGORIES

Categories Select Category Appointments Budgets Bug Bounty & Rewards Business
News Compliance Cyber Essentials Cyber Warfare Cybersecurity Awareness Month
Cybersecurity News Dark Web News Data Breach News DDoS Attacks News Deepfake
Espionage Features Firewall Daily Gitex2022 Governance Hacker Claims Hacker News
Hacking News How to Interviews Learning & Development Lockbit Ransomware News
Main Story Malware News Market Reports Mergers & Aquisitions Partnerships
Podcast Policy Updates Press Release Ransomware News Regulations Research
Resources Sponsored Content Startups Threat Intelligence Threat Intelligence
News Vulnerabilities Vulnerability News Whitepapers Workforce
Select Category




WEB STORIES

Top 10 CISOs to Follow in 2023
Top 10 Ransomware Gangs in 2023
Top 5 IoT Security Risks in 2023
Top 10 CTF Platforms in 2023
Types of Risks Covered by Cyber Insurance







ABOUT


THE CYBER EXPRESS BY CYBLE

#1 Trending Cybersecurity News and Magazine

The Cyber Express  by Cyble is a handbook for all stakeholders of the internet
that provides information security professionals with the latest news, updates
and knowledge they need to combat cyber threats.

 


CONTACT

For editorial queries: editor@thecyberexpress.com

For marketing and Sales: raj@thecyberexpress.com

For Events & Conferences related information: ashish.j@thecyberexpress.com

 


QUICK LINKS

 * About Us
 * Advertise With Us
 * Contact Us
 * Editorial Calendar
 * Careers
 * The Cyber Express by Cyble Vulnerability Disclosure Policy


OUR ADDRESS

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
555 North Point Center E
Alpharetta, GA 30022, USA.

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon
East, Mumbai, Maharashtra, India – 4000063




SUBSCRIBE TO OUR FEED

RSS Feeds

Follow Us On Google News
 * Privacy Statement
 * Terms of Use
 * Write For Us

© 2024 The Cyber Express (Cybersecurity News and Magazine) | By Cyble Inc.


No Result
View All Result
 * Magazine
 * Firewall Daily
 * Essentials
   * Regulations
   * Compliance
   * Governance
   * Policy Updates
 * Features
   * Cyber Warfare
   * Espionage
   * Workforce
     * Learning & Development
 * Business
   * Startups
   * Mergers & Aquisitions
   * Partnerships
   * Appointments
   * Budgets
   * Research
     * Whitepapers
     * Sponsored Content
     * Market Reports
   * Interviews
     * Podcast
 * Events
   * World CyberCon 3rd Edition – META
   * World CyberCon India 2023
   *  Cyber Security Webinar
   * Endorsed Events
 * Products
   * Cyble Vision
   * Cyble Hawk (LEA, Govt.)
   * Am I Breached
   * Cyble Odin

© 2024 The Cyber Express (Cybersecurity News and Magazine) | By Cyble Inc.


WELCOME BACK!

Login to your account below







Remember Me



Forgotten Password?


RETRIEVE YOUR PASSWORD

Please enter your username or email address to reset your password.









Log In


ADD NEW PLAYLIST



- Select Visibility -PublicPrivate





This website uses cookies. By continuing to use this website you are giving
consent to cookies being used. Visit our Privacy and Cookie Policy. I Agree

Top 10 CISOs to Follow in 2023 Top 10 Ransomware Gangs in 2023 Top 5 IoT
Security Risks in 2023 Top 10 CTF Platforms in 2023 Types of Risks Covered by
Cyber Insurance





Stay up-to-date on the latest security news, trends, and thought leadership.


AllowCancel



WELCOME TO THECYBEREXPRESS.COM


THECYBEREXPRESS.COM ASKS FOR YOUR CONSENT TO USE YOUR PERSONAL DATA TO:

 * perm_identity
   Personalised advertising and content, advertising and content measurement,
   audience research and services development
 * devices
   Store and/or access information on a device

expand_moreremove
Learn more
 * 
   How can I change my choice?
 * 
   What if I don't consent?
 * 
   How does legitimate interest work?
 * 
   Do I have to consent to everything?

Your personal data will be processed and information from your device (cookies,
unique identifiers, and other device data) may be stored by, accessed by and
shared with 135 TCF vendor(s) and 67 ad partner(s), or used specifically by this
site or app.

Some vendors may process your personal data on the basis of legitimate interest,
which you can object to by managing your options below. Look for a link at the
bottom of this page or in our privacy policy where you can withdraw consent.

Consent



Manage options

arrow_back

Data preferences


MANAGE YOUR DATA

You can choose how your personal data is used. Vendors want your permission to
do the following:

TCF vendors

help_outline


STORE AND/OR ACCESS INFORMATION ON A DEVICE

Cookies, device or similar online identifiers (e.g. login-based identifiers,
randomly assigned identifiers, network based identifiers) together with other
information (e.g. browser type and information, language, screen size, supported
technologies etc.) can be stored or read on your device to recognise it each
time it connects to an app or to a website, for one or several of the purposes
presented here.

View details
Consent (119 vendors)


USE LIMITED DATA TO SELECT ADVERTISING

Advertising presented to you on this service can be based on limited data, such
as the website or app you are using, your non-precise location, your device type
or which content you are (or have been) interacting with (for example, to limit
the number of times an ad is presented to you).

View details
Consent (70 vendors)Legitimate interest (32 vendors)help_outline


CREATE PROFILES FOR PERSONALISED ADVERTISING

Information about your activity on this service (such as forms you submit,
content you look at) can be stored and combined with other information about you
(for example, information from your previous activity on this service and other
websites or apps) or similar users. This is then used to build or improve a
profile about you (that might include possible interests and personal aspects).
Your profile can be used (also later) to present advertising that appears more
relevant based on your possible interests by this and other entities.

View details
Consent (98 vendors)


USE PROFILES TO SELECT PERSONALISED ADVERTISING

Advertising presented to you on this service can be based on your advertising
profiles, which can reflect your activity on this service or other websites or
apps (like the forms you submit, content you look at), possible interests and
personal aspects.

View details
Consent (92 vendors)


CREATE PROFILES TO PERSONALISE CONTENT

Information about your activity on this service (for instance, forms you submit,
non-advertising content you look at) can be stored and combined with other
information about you (such as your previous activity on this service or other
websites or apps) or similar users. This is then used to build or improve a
profile about you (which might for example include possible interests and
personal aspects). Your profile can be used (also later) to present content that
appears more relevant based on your possible interests, such as by adapting the
order in which content is shown to you, so that it is even easier for you to
find content that matches your interests.

View details
Consent (32 vendors)


USE PROFILES TO SELECT PERSONALISED CONTENT

Content presented to you on this service can be based on your content
personalisation profiles, which can reflect your activity on this or other
services (for instance, the forms you submit, content you look at), possible
interests and personal aspects, such as by adapting the order in which content
is shown to you, so that it is even easier for you to find (non-advertising)
content that matches your interests.

View details
Consent (26 vendors)


MEASURE ADVERTISING PERFORMANCE

Information regarding which advertising is presented to you and how you interact
with it can be used to determine how well an advert has worked for you or other
users and whether the goals of the advertising were reached. For instance,
whether you saw an ad, whether you clicked on it, whether it led you to buy a
product or visit a website, etc. This is very helpful to understand the
relevance of advertising campaigns.

View details
Consent (77 vendors)Legitimate interest (46 vendors)help_outline


MEASURE CONTENT PERFORMANCE

Information regarding which content is presented to you and how you interact
with it can be used to determine whether the (non-advertising) content e.g.
reached its intended audience and matched your interests. For instance, whether
you read an article, watch a video, listen to a podcast or look at a product
description, how long you spent on this service and the web pages you visit etc.
This is very helpful to understand the relevance of (non-advertising) content
that is shown to you.

View details
Consent (31 vendors)Legitimate interest (14 vendors)help_outline


UNDERSTAND AUDIENCES THROUGH STATISTICS OR COMBINATIONS OF DATA FROM DIFFERENT
SOURCES

Reports can be generated based on the combination of data sets (like user
profiles, statistics, market research, analytics data) regarding your
interactions and those of other users with advertising or (non-advertising)
content to identify common characteristics (for instance, to determine which
target audiences are more receptive to an ad campaign or to certain contents).

View details
Consent (57 vendors)Legitimate interest (20 vendors)help_outline


DEVELOP AND IMPROVE SERVICES

Information about your activity on this service, such as your interaction with
ads or content, can be very helpful to improve products and services and to
build new products and services based on user interactions, the type of
audience, etc. This specific purpose does not include the development or
improvement of user profiles and identifiers.

View details
Consent (65 vendors)Legitimate interest (37 vendors)help_outline


USE LIMITED DATA TO SELECT CONTENT

Content presented to you on this service can be based on limited data, such as
the website or app you are using, your non-precise location, your device type,
or which content you are (or have been) interacting with (for example, to limit
the number of times a video or an article is presented to you).

View details
Consent (9 vendors)Legitimate interest (2 vendors)help_outline


ENSURE SECURITY, PREVENT AND DETECT FRAUD, AND FIX ERRORS

help_outline

Your data can be used to monitor for and prevent unusual and possibly fraudulent
activity (for example, regarding advertising, ad clicks by bots), and ensure
systems and processes work properly and securely. It can also be used to correct
any problems you, the publisher or the advertiser may encounter in the delivery
of content and ads and in your interaction with them.

View details


DELIVER AND PRESENT ADVERTISING AND CONTENT

help_outline

Certain information (like an IP address or device capabilities) is used to
ensure the technical compatibility of the content or advertising, and to
facilitate the transmission of the content or ad to your device.

View details


MATCH AND COMBINE DATA FROM OTHER DATA SOURCES

help_outline

Information about your activity on this service may be matched and combined with
other information relating to you and originating from various sources (for
instance your activity on a separate online service, your use of a loyalty card
in-store, or your answers to a survey), in support of the purposes explained in
this notice.

View details


LINK DIFFERENT DEVICES

help_outline

In support of the purposes explained in this notice, your device might be
considered as likely linked to other devices that belong to you or your
household (for instance because you are logged in to the same service on both
your phone and your computer, or because you may use the same Internet
connection on both devices).

View details


IDENTIFY DEVICES BASED ON INFORMATION TRANSMITTED AUTOMATICALLY

help_outline

Your device might be distinguished from other devices based on information it
automatically sends when accessing the Internet (for instance, the IP address of
your Internet connection or the type of browser you are using) in support of the
purposes exposed in this notice.

View details


USE PRECISE GEOLOCATION DATA

With your acceptance, your precise location (within a radius of less than 500
metres) may be used in support of the purposes explained in this notice.

View details
Consent

Vendor preferences

Accept all



Confirm choices

arrow_back

Vendor preferences


CONFIRM OUR VENDORS

Vendors can use your data to provide services. Declining a vendor can stop them
from using the data you shared.

TCF vendors

help_outline


EXPONENTIAL INTERACTIVE, INC D/B/A VDX.TV

Cookie duration: 90 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, IP addresses, Device identifiers,
Non-precise location data

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


ROQ.AD GMBH

Cookie duration: 365 (days).

Data collected and processed: Browsing and interaction data, Privacy choices,
Probabilistic identifiers, Authentication-derived identifiers, IP addresses,
Device characteristics, Precise location data, Device identifiers, Non-precise
location data

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


ADMAXIM LIMITED

Cookie duration: 30 (days).

Data collected and processed: Browsing and interaction data, Probabilistic
identifiers, IP addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


INDEX EXCHANGE INC.

Cookie duration: 395 (days).

Data collected and processed: Privacy choices, IP addresses, Device
characteristics, Precise location data, Device identifiers, Non-precise location
data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


QUANTCAST

Cookie duration: 396 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, Authentication-derived identifiers,
IP addresses, Device characteristics, Device identifiers, Non-precise location
data, User-provided data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


BEESWAXIO CORPORATION

Cookie duration: 395 (days).

Data collected and processed: Browsing and interaction data, Privacy choices,
Probabilistic identifiers, IP addresses, Device characteristics, Precise
location data, Device identifiers, Non-precise location data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


SOVRN, INC.

Cookie duration: 365 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, IP addresses, Device characteristics, Non-precise location data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


ADIKTEEV

Doesn't use cookies.

Data collected and processed: Users’ profiles, Probabilistic identifiers,
Authentication-derived identifiers, IP addresses, Device characteristics, Device
identifiers, Non-precise location data

more

Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


RTB HOUSE S.A.

Cookie duration: 365 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, IP addresses, Device characteristics, Device identifiers,
Non-precise location data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


THE UK TRADE DESK LTD

Cookie duration: 3629 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, Authentication-derived identifiers,
IP addresses, Device characteristics, Precise location data, Device identifiers,
Non-precise location data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


ADMETRICS GMBH

Doesn't use cookies.

Data collected and processed: Browsing and interaction data, Privacy choices, IP
addresses, Device characteristics

more




View details | Privacy policylaunch
Consent


AMOBEE INC.

Cookie duration: 180 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, IP addresses, Device
characteristics, Device identifiers, Non-precise location data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


EPSILON

Cookie duration: 184 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, Authentication-derived identifiers,
IP addresses, Device characteristics, Device identifiers, Non-precise location
data, User-provided data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


YAHOO EMEA LIMITED

Cookie duration: 397 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, IP addresses, Device
characteristics, Precise location data, Device identifiers, Non-precise location
data

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


ADVENTORI SAS

Cookie duration: 90 (days).

Data collected and processed: Browsing and interaction data,
Authentication-derived identifiers, IP addresses, Device identifiers,
Non-precise location data, User-provided data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


TRIPLELIFT, INC.

Cookie duration: 90 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Authentication-derived identifiers, IP addresses, Device
characteristics, Precise location data, Device identifiers, Non-precise location
data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


XANDR, INC.

Cookie duration: 90 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Authentication-derived identifiers, IP addresses, Device
characteristics, Precise location data, Device identifiers, Non-precise location
data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


NEORY GMBH

Cookie duration: 90 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, Authentication-derived identifiers,
IP addresses, Device characteristics, Device identifiers, Non-precise location
data, User-provided data

more

Cookie duration resets each session.


View details | Privacy policylaunch
Consent


UNRULY GROUP LLC

Cookie duration: 365 (days).

Data collected and processed: Users’ profiles, Privacy choices, Probabilistic
identifiers, IP addresses, Device characteristics, Device identifiers,
Non-precise location data

more

Cookie duration resets each session.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


NEURAL.ONE

Cookie duration: 365 (days).

Data collected and processed: Browsing and interaction data, Privacy choices,
Probabilistic identifiers, IP addresses, Device characteristics, Non-precise
location data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


ADITION (VIRTUAL MINDS GMBH)

Cookie duration: 365 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, IP addresses, Device
characteristics, Precise location data, Device identifiers, Non-precise location
data, User-provided data

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


ACTIVE AGENT (VIRTUAL MINDS GMBH)

Cookie duration: 365 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, IP addresses, Device
characteristics, Precise location data, Device identifiers, Non-precise location
data, User-provided data

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


TABOOLA EUROPE LIMITED

Cookie duration: 366 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, IP addresses, Device
characteristics, Device identifiers, Non-precise location data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


EQUATIV

Cookie duration: 396 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, Authentication-derived identifiers,
IP addresses, Device characteristics, Precise location data, Device identifiers,
Non-precise location data

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


ADFORM A/S

Cookie duration: 1 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, Authentication-derived identifiers,
IP addresses, Device characteristics, Device identifiers, Non-precise location
data, User-provided data

more




View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


MAGNITE, INC.

Cookie duration: 365 (days).

Data collected and processed: Browsing and interaction data, Privacy choices,
Probabilistic identifiers, IP addresses, Device characteristics, Precise
location data, Device identifiers, Non-precise location data

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


RATEGAIN ADARA INC

Cookie duration: 730 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Authentication-derived identifiers, IP addresses, Device
characteristics, Device identifiers, Non-precise location data, User-provided
data

more




View details | Storage details | Privacy policylaunch
Consent


SIFT MEDIA, INC

Doesn't use cookies.

Data collected and processed: IP addresses, Device characteristics, Precise
location data, Device identifiers, Non-precise location data

more




View details | Privacy policylaunch
Consent


RAKUTEN MARKETING LLC

Cookie duration: 730 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, Authentication-derived identifiers,
IP addresses, Device characteristics, Device identifiers, Non-precise location
data, User-provided data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


LUMEN RESEARCH LIMITED

Doesn't use cookies.

Data collected and processed: Browsing and interaction data, IP addresses,
Device characteristics, Non-precise location data

more




View details | Privacy policylaunch
Legitimate interesthelp_outline


AMAZON AD SERVER

Cookie duration: 396 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Authentication-derived identifiers, IP addresses, Device
characteristics, Device identifiers, Non-precise location data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


OPENX

Cookie duration: 365 (days).

Data collected and processed: Browsing and interaction data, Privacy choices, IP
addresses, Device characteristics, Device identifiers, Non-precise location data

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


YIELDLAB (VIRTUAL MINDS GMBH)

Cookie duration: 365 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, IP addresses, Device characteristics, Precise location data,
Device identifiers, Non-precise location data, User-provided data

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


ROKU ADVERTISING SERVICES

Cookie duration: 396 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, Authentication-derived identifiers,
IP addresses, Device characteristics, Precise location data, Device identifiers,
Non-precise location data, User-provided data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


SIMPLIFI HOLDINGS INC

Cookie duration: 366 (days).

Data collected and processed: IP addresses, Precise location data, Device
identifiers

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


PUBMATIC, INC

Cookie duration: 90 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, Authentication-derived identifiers,
IP addresses, Device characteristics, Precise location data, Device identifiers,
Non-precise location data, User-provided data

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


COMSCORE B.V.

Cookie duration: 720 (days).

Data collected and processed: Browsing and interaction data, Privacy choices,
Probabilistic identifiers, Authentication-derived identifiers, IP addresses,
Device characteristics, Device identifiers, User-provided data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


FLASHTALKING

Cookie duration: 730 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, Authentication-derived identifiers,
IP addresses, Device characteristics, Device identifiers, Non-precise location
data

more




View details | Privacy policylaunch
Consent


PULSEPOINT, INC.

Cookie duration: 365 (days).

Data collected and processed: IP addresses, Device characteristics, Device
identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


SMAATO, INC.

Cookie duration: 21 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Authentication-derived identifiers, IP addresses, Device
characteristics, Precise location data, Device identifiers, Non-precise location
data, User-provided data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


SEMASIO GMBH

Cookie duration: 366 (days).

Data collected and processed: Browsing and interaction data, Privacy choices, IP
addresses, Device identifiers

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


CRIMTAN HOLDINGS LIMITED

Cookie duration: 365 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, Authentication-derived identifiers,
IP addresses, Device characteristics, Precise location data, Device identifiers,
Non-precise location data, User-provided data

more

Cookie duration resets each session.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


GENIUS SPORTS UK LIMITED

Cookie duration: 365 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, Authentication-derived identifiers,
IP addresses, Device characteristics, Device identifiers, Non-precise location
data

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


CRITEO SA

Cookie duration: 390 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, Authentication-derived identifiers,
IP addresses, Device characteristics, Device identifiers, Non-precise location
data

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


ADLOOX SA

Doesn't use cookies.

Data collected and processed: Browsing and interaction data, Probabilistic
identifiers, IP addresses, Device characteristics, Device identifiers,
Non-precise location data

more

Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


BLIS GLOBAL LIMITED

Cookie duration: 400 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, Authentication-derived identifiers,
IP addresses, Device characteristics, Precise location data, Device identifiers,
Non-precise location data, User-provided data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


LOTAME SOLUTIONS, INC

Cookie duration: 274 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, Authentication-derived identifiers,
IP addresses, Device characteristics, Device identifiers, User-provided data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


LIVERAMP

Cookie duration: 365 (days).

Data collected and processed: Browsing and interaction data, Privacy choices,
Authentication-derived identifiers, IP addresses, Device characteristics, Device
identifiers, Non-precise location data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


GROUPM UK LIMITED

Cookie duration: 395 (days).

Data collected and processed: Browsing and interaction data, Privacy choices,
Probabilistic identifiers, Authentication-derived identifiers, IP addresses,
Device characteristics, Precise location data, Device identifiers, Non-precise
location data

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


LOOPME LIMITED

Cookie duration: 90 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, IP addresses, Device
characteristics, Precise location data, Device identifiers, Non-precise location
data, User-provided data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


DYNATA LLC

Cookie duration: 365 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Authentication-derived identifiers, IP addresses, Device
characteristics, Device identifiers, Non-precise location data, User-provided
data

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


ASK LOCALA

Doesn't use cookies.

Data collected and processed: Privacy choices, IP addresses, Device
characteristics, Precise location data, Device identifiers, Non-precise location
data

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


NEAR INTELLIGENCE

Doesn't use cookies.

Data collected and processed: Browsing and interaction data, IP addresses,
Device characteristics, Precise location data, Device identifiers, Non-precise
location data

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


DOUBLEVERIFY INC.

Doesn't use cookies.

Data collected and processed: Browsing and interaction data, Privacy choices,
Probabilistic identifiers, IP addresses, Device characteristics, Non-precise
location data

more




View details | Privacy policylaunch
Legitimate interesthelp_outline


BIDSWITCH GMBH

Cookie duration: 365 (days).

Data collected and processed: Browsing and interaction data, Privacy choices,
Probabilistic identifiers, Authentication-derived identifiers, IP addresses,
Device characteristics, Precise location data, Device identifiers, Non-precise
location data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


IPONWEB GMBH

Cookie duration: 365 (days).

Data collected and processed: Browsing and interaction data, Privacy choices,
Authentication-derived identifiers, IP addresses, Device characteristics, Device
identifiers, Non-precise location data, User-provided data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


NEXTROLL, INC.

Cookie duration: 183 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, IP addresses, Device characteristics, Device identifiers,
Non-precise location data, User-provided data

more

Cookie duration resets each session.


View details | Privacy policylaunch
Consent


TEADS FRANCE SAS

Cookie duration: 365 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, IP addresses, Device
characteristics, Device identifiers, Non-precise location data

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


STRÖER SSP GMBH (SSP)

Cookie duration: 365 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, IP addresses, Device
characteristics, Device identifiers, Non-precise location data

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


OS DATA SOLUTIONS GMBH &AMP; CO. KG

Cookie duration: 90 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, IP addresses, Device
characteristics, Device identifiers, Non-precise location data, User-provided
data

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


PERMODO GMBH

Doesn't use cookies.

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, IP addresses, Device characteristics, Device identifiers,
Non-precise location data

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


PLATFORM161 B.V.

Cookie duration: 396 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, IP addresses, Device
characteristics, Precise location data, Device identifiers, Non-precise location
data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


ADACADO TECHNOLOGIES INC. (DBA ADACADO)

Cookie duration: 365 (days).

Data collected and processed: Browsing and interaction data, Privacy choices, IP
addresses, Non-precise location data

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


BASIS GLOBAL TECHNOLOGIES, INC.

Cookie duration: 365 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Authentication-derived identifiers, IP addresses, Device
characteristics, Precise location data, Device identifiers, Non-precise location
data

more

Cookie duration resets each session.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


SMADEX, S.L.U.

Cookie duration: 365 (days).

Data collected and processed: Users’ profiles, Privacy choices, Probabilistic
identifiers, IP addresses, Device characteristics, Device identifiers,
Non-precise location data, User-provided data

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


BOMBORA INC.

Cookie duration: 365 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Authentication-derived identifiers, IP addresses, Device characteristics, Device
identifiers, Non-precise location data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


EASYMEDIA GMBH

Cookie duration: 365 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, IP addresses, Device
characteristics, Precise location data, Device identifiers, Non-precise location
data

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


REMERGE GMBH

Doesn't use cookies.

Data collected and processed: Browsing and interaction data, IP addresses,
Device characteristics, Device identifiers, Non-precise location data

more

Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


ADVANCED STORE GMBH

Cookie duration: 365 (days).

Data collected and processed: Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


MAGNITE CTV, INC.

Cookie duration: 366 (days).

Data collected and processed: Browsing and interaction data, Privacy choices,
Probabilistic identifiers, IP addresses, Device characteristics, Precise
location data, Device identifiers, Non-precise location data

more




View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


DELTA PROJECTS AB

Cookie duration: 365 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, Authentication-derived identifiers,
IP addresses, Device characteristics, Precise location data, Device identifiers,
Non-precise location data, User-provided data

more




View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


USEMAX ADVERTISEMENT (EMEGO GMBH)

Cookie duration: 365 (days).

Data collected and processed: Users’ profiles

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


EMETRIQ GMBH

Cookie duration: 365 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, Authentication-derived identifiers,
IP addresses, Device characteristics, Device identifiers, Non-precise location
data, User-provided data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


PUBLICIS MEDIA GMBH

Cookie duration: 1825 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, Authentication-derived identifiers,
IP addresses, Device characteristics, Device identifiers, Non-precise location
data, User-provided data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


M.D. PRIMIS TECHNOLOGIES LTD.

Cookie duration: 25 (days).

Data collected and processed: Browsing and interaction data, Privacy choices,
Probabilistic identifiers, IP addresses, Device characteristics, Device
identifiers, Non-precise location data, User-provided data

more




View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


ONETAG LIMITED

Cookie duration: 396 (days).

Data collected and processed: Browsing and interaction data, Privacy choices, IP
addresses, Device characteristics, Device identifiers, Non-precise location data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


CLOUD TECHNOLOGIES S.A.

Cookie duration: 365 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Authentication-derived identifiers, IP addresses, Device
characteristics, Device identifiers, Non-precise location data

more

Cookie duration resets each session.


View details | Privacy policylaunch
Consent


SMARTOLOGY LIMITED

Doesn't use cookies.

Data collected and processed: IP addresses

more

Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


IMPROVE DIGITAL

Cookie duration: 90 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, Authentication-derived identifiers,
IP addresses, Device characteristics, Precise location data, Device identifiers,
Non-precise location data, User-provided data

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


ADOBE ADVERTISING CLOUD

Cookie duration: 365 (days).

Data collected and processed: Privacy choices, Authentication-derived
identifiers, IP addresses, Device identifiers

more




View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


BANNERFLOW AB

Cookie duration: 366 (days).

Data collected and processed: IP addresses

more




View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


TABMO SAS

Doesn't use cookies.

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, IP addresses, Device
characteristics, Precise location data, Device identifiers, Non-precise location
data, User-provided data

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


INTEGRAL AD SCIENCE (INCORPORATING ADMANTX)

Doesn't use cookies.

Data collected and processed: Browsing and interaction data, Privacy choices, IP
addresses, Device characteristics, Non-precise location data

more




View details | Privacy policylaunch
Legitimate interesthelp_outline


WIZALY

Cookie duration: 365 (days).

Data collected and processed: Browsing and interaction data, Privacy choices,
Authentication-derived identifiers, IP addresses, Device characteristics,
Non-precise location data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


WEBORAMA

Cookie duration: 393 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, Authentication-derived identifiers,
IP addresses, Device characteristics, Device identifiers, Non-precise location
data, User-provided data

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


JIVOX CORPORATION

Cookie duration: 30 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, IP addresses, Precise location data, Device identifiers,
Non-precise location data

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


MOBILE PROFESSIONALS BV / SAGE&#43;ARCHER BV

Doesn't use cookies.

Data collected and processed: Non-precise location data

more




View details | Privacy policylaunch
Consent


ON DEVICE RESEARCH LIMITED

Cookie duration: 30 (days).

Data collected and processed: Browsing and interaction data, IP addresses,
Device characteristics, Precise location data, Device identifiers, Non-precise
location data, User-provided data

more




View details | Storage details | Privacy policylaunch
Consent


ROCKABOX MEDIA LTD

Doesn't use cookies.

Data collected and processed: Browsing and interaction data, IP addresses,
Device characteristics, Non-precise location data

more




View details | Storage details | Privacy policylaunch
Legitimate interesthelp_outline


EXACTAG GMBH

Cookie duration: 180 (days).

Data collected and processed: Browsing and interaction data, Privacy choices,
Authentication-derived identifiers, IP addresses, Device characteristics, Device
identifiers

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


CELTRA INC.

Doesn't use cookies.

Data collected and processed: IP addresses, Device characteristics, Precise
location data, Device identifiers

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


MAINADV SRL

Cookie duration: 30 (days).

Data collected and processed: Browsing and interaction data, Privacy choices, IP
addresses, Device characteristics, Device identifiers, Non-precise location
data, User-provided data

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


GEMIUS SA

Cookie duration: 1825 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Device characteristics, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


THE KANTAR GROUP LIMITED

Cookie duration: 914 (days).

Data collected and processed: Browsing and interaction data, Privacy choices, IP
addresses, Device characteristics, Device identifiers, Non-precise location data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


NIELSEN MEDIA RESEARCH LTD.

Cookie duration: 120 (days).

Data collected and processed: Browsing and interaction data, Privacy choices, IP
addresses, Device characteristics, Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


SOLOCAL SA

Cookie duration: 396 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, IP addresses, Device characteristics, Precise location data,
Device identifiers, Non-precise location data, User-provided data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


PIXALATE, INC.

Doesn't use cookies.

Data collected and processed: Browsing and interaction data, IP addresses,
Device characteristics, Device identifiers, Non-precise location data

more




View details | Storage details | Privacy policylaunch
Consent


ORACLE ADVERTISING

Cookie duration: 180 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Authentication-derived identifiers, Device characteristics,
Device identifiers, Non-precise location data, User-provided data

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


NUMBERLY

Cookie duration: 180 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Authentication-derived identifiers, IP addresses, Device
characteristics, Device identifiers, Non-precise location data, User-provided
data

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


AUDIENCEPROJECT APS

Cookie duration: 365 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, Authentication-derived identifiers,
IP addresses, Device characteristics, Device identifiers, Non-precise location
data, User-provided data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


DEMANDBASE, INC.

Cookie duration: 730 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, IP addresses, Device
characteristics, Precise location data, Device identifiers, Non-precise location
data, User-provided data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


EFFILIATION / EFFINITY

Cookie duration: 2 (days).

Data collected and processed: Device characteristics

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


SEENTHIS AB

Doesn't use cookies.

Data collected and processed: IP addresses, Device characteristics

more




View details | Privacy policylaunch


COMMANDERS ACT

Cookie duration: 365 (days).

Data collected and processed: IP addresses, Device identifiers

more




View details | Storage details | Privacy policylaunch
Consent


TRAVEL AUDIENCE GMBH

Cookie duration: 397 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Probabilistic identifiers, Authentication-derived identifiers, IP addresses,
Device characteristics, Precise location data, Device identifiers, Non-precise
location data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


HUMAN

Doesn't use cookies.

Data collected and processed: Probabilistic identifiers, IP addresses, Device
characteristics, Device identifiers, Non-precise location data

more




View details | Privacy policylaunch
Legitimate interesthelp_outline


BLENDEE SRL

Cookie duration: 366 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Authentication-derived identifiers, IP addresses, Device
characteristics, Device identifiers, Non-precise location data, User-provided
data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


INNOVID LLC

Cookie duration: 90 (days).

Data collected and processed: Browsing and interaction data, Privacy choices, IP
addresses, Device characteristics, Device identifiers, Non-precise location data

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


PAPIRFLY AS

Doesn't use cookies.

Data collected and processed: Device characteristics

more




View details | Privacy policylaunch
Legitimate interesthelp_outline


NEUSTAR, INC., A TRANSUNION COMPANY

Cookie duration: 365 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, Authentication-derived identifiers,
IP addresses, Device characteristics, Device identifiers, Non-precise location
data, User-provided data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


SALESFORCE.COM, INC.

Cookie duration: 180 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Authentication-derived identifiers, Device characteristics,
Device identifiers, Non-precise location data, User-provided data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


VERVE GROUP EUROPE GMBH

Doesn't use cookies.

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Authentication-derived identifiers, IP addresses, Device
characteristics, Precise location data, Device identifiers, Non-precise location
data, User-provided data

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


OTTO (GMBH &AMP; CO KG)

Cookie duration: 365 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, IP addresses, Device identifiers, User-provided data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


ADOBE AUDIENCE MANAGER, ADOBE EXPERIENCE PLATFORM

Cookie duration: 180 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, Authentication-derived identifiers,
IP addresses, Device characteristics, Precise location data, Device identifiers,
Non-precise location data, User-provided data

more

Cookie duration resets each session.


View details | Privacy policylaunch
Consent


LOCALSENSOR B.V.

Doesn't use cookies.

Data collected and processed: Privacy choices, IP addresses, Device
characteristics, Precise location data, Device identifiers, Non-precise location
data

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


ONLINE SOLUTION

Cookie duration: 365 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, IP addresses, Device
characteristics, Precise location data, Device identifiers, Non-precise location
data, User-provided data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


RELAY42 NETHERLANDS B.V.

Cookie duration: 730 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, IP addresses, Device
characteristics, Device identifiers, User-provided data

more




View details | Storage details | Privacy policylaunch
Consent


GP ONE GMBH

Cookie duration: Uses session cookies.

Data collected and processed: Browsing and interaction data, Privacy choices, IP
addresses, Device characteristics, Non-precise location data, User-provided data

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


THE MEDIAGRID INC.

Cookie duration: 365 (days).

Data collected and processed: Browsing and interaction data, Privacy choices,
Probabilistic identifiers, IP addresses, Device characteristics, Precise
location data, Device identifiers, Non-precise location data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


MINDTAKE RESEARCH GMBH

Cookie duration: 180 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Probabilistic identifiers, IP addresses, Device characteristics, Device
identifiers

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


CINT AB

Cookie duration: 730 (days).

Data collected and processed: Browsing and interaction data, Privacy choices, IP
addresses, Device characteristics, Device identifiers

more




View details | Privacy policylaunch
Consent


GOOGLE ADVERTISING PRODUCTS

Cookie duration: 396 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Authentication-derived identifiers, IP addresses, Device
characteristics, Device identifiers, Non-precise location data, User-provided
data

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


GFK SE

Cookie duration: 730 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Authentication-derived identifiers, IP addresses, Device
characteristics, Device identifiers, Non-precise location data, User-provided
data

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


REVJET

Cookie duration: 730 (days).

Data collected and processed: Users’ profiles, Privacy choices, IP addresses,
Device identifiers, Non-precise location data

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


PROTECTED MEDIA LTD

Doesn't use cookies.

Data collected and processed: Browsing and interaction data, Probabilistic
identifiers, IP addresses, Device characteristics, Device identifiers

more




View details | Privacy policylaunch
Legitimate interesthelp_outline


CLINCH LABS LTD

Cookie duration: 730 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Probabilistic identifiers, IP addresses, Device
characteristics, Device identifiers, Non-precise location data

more

Cookie duration resets each session.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


ORACLE DATA CLOUD - MOAT

Doesn't use cookies.

Data collected and processed: IP addresses, Non-precise location data

more




View details | Privacy policylaunch
Legitimate interesthelp_outline


HEARTS AND SCIENCE MÜNCHEN GMBH

Cookie duration: 60 (days).

Data collected and processed: IP addresses

more

Cookie duration resets each session.


View details | Privacy policylaunch
Consent


AMAZON ADVERTISING

Cookie duration: 396 (days).

Data collected and processed: Browsing and interaction data, Users’ profiles,
Privacy choices, Authentication-derived identifiers, IP addresses, Device
characteristics, Device identifiers, Non-precise location data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


MOLOCO, INC.

Cookie duration: 730 (days).

Data collected and processed: IP addresses, Device characteristics, Device
identifiers, Non-precise location data

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


ADTRIBA GMBH

Cookie duration: 730 (days).

Data collected and processed: Browsing and interaction data, Privacy choices,
Authentication-derived identifiers, IP addresses, Device characteristics, Device
identifiers, Non-precise location data

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


OBJECTIVE PARTNERS BV

Cookie duration: 90 (days).

Data collected and processed: Device identifiers

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


ENSIGHTEN

Cookie duration: 1825 (days).

Data collected and processed: Browsing and interaction data, Privacy choices, IP
addresses, Device characteristics, Device identifiers

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Legitimate interesthelp_outline


EBAY INC

Cookie duration: 90 (days).

Data collected and processed: Privacy choices, IP addresses, Device
characteristics

more




View details | Storage details | Privacy policylaunch
Consent


HURRA COMMUNICATIONS GMBH

Cookie duration: 366 (days).

Data collected and processed: Authentication-derived identifiers, IP addresses,
Device characteristics, Precise location data, Device identifiers, Non-precise
location data

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent

Ad partners

help_outline


GSKINNER

Privacy policylaunch
Consent


AKAMAI

Privacy policylaunch
Consent


FACEBOOK

Privacy policylaunch
Consent


AUNICA

Privacy policylaunch
Consent


BOOKING.COM

Privacy policylaunch
Consent


C3 METRICS

Privacy policylaunch
Consent


IBM

Privacy policylaunch
Consent


EVIDON

Privacy policylaunch
Consent


CUBED

Privacy policylaunch
Consent


OPTOMATON

Privacy policylaunch
Consent


INTELLIAD

Privacy policylaunch
Consent


ANALIGHTS

Privacy policylaunch
Consent


DSTILLERY

Privacy policylaunch
Consent


MEDIAMATH

Privacy policylaunch
Consent


DMA INSTITUTE

Privacy policylaunch
Consent


ZMS

Privacy policylaunch
Consent


DENTSU AEGIS NETWORK

Privacy policylaunch
Consent


IGNITION ONE

Privacy policylaunch
Consent


OMNICOM MEDIA GROUP

Privacy policylaunch
Consent


DIGISEG

Privacy policylaunch
Consent


RESONATE

Privacy policylaunch
Consent


SOJERN

Privacy policylaunch
Consent


HAENSEL AMS

Privacy policylaunch
Consent


BDSK HANDELS GMBH & CO. KG

Privacy policylaunch
Consent


VIDEOLOGY

Privacy policylaunch
Consent


TRADEDOUBLER AB

Privacy policylaunch
Consent


TRUSTARC

Privacy policylaunch
Consent


TRUEFFECT

Privacy policylaunch
Consent


MARKETING SCIENCE CONSULTING GROUP, INC.

Privacy policylaunch
Consent


DENTSU

Privacy policylaunch
Consent


ESSENS

Privacy policylaunch
Consent


TRAVEL DATA COLLECTIVE

Privacy policylaunch
Consent


ADVOLUTION.CONTROL

Privacy policylaunch
Consent


WIDESPACE

Privacy policylaunch
Consent


LIFESTREET

Privacy policylaunch
Consent


VIMEO

Privacy policylaunch
Consent


BATCH MEDIA

Privacy policylaunch
Consent


VODAFONE GMBH

Privacy policylaunch
Consent


MAGNITE

Privacy policylaunch
Consent


SCENESTEALER

Privacy policylaunch
Consent


NETQUEST

Privacy policylaunch
Consent


MANAGE.COM

Privacy policylaunch
Consent


CLOUDFLARE

Privacy policylaunch
Consent


HAVAS MEDIA FRANCE - DBI

Privacy policylaunch
Consent


NETFLIX

Privacy policylaunch
Consent


MACROMILL GROUP

Privacy policylaunch
Consent


EBUILDERS

Privacy policylaunch
Consent


APPLOVIN CORP.

Privacy policylaunch
Consent


NANO INTERACTIVE

Privacy policylaunch
Consent


FRACTIONAL MEDIA

Privacy policylaunch
Consent


RACKSPACE

Privacy policylaunch
Consent


LIFTOFF

Privacy policylaunch
Consent


MSI-ACI

Privacy policylaunch
Consent


ARRIVALIST

Privacy policylaunch
Consent


NAVEGG

Privacy policylaunch
Consent


ADMEDO

Privacy policylaunch
Consent


KOCHAVA

Privacy policylaunch
Consent


MOBITRANS

Privacy policylaunch
Consent


ADEX

Privacy policylaunch
Consent


IMPACT

Privacy policylaunch
Consent


SPOTAD

Privacy policylaunch
Consent


AARKI

Privacy policylaunch
Consent


SFR

Privacy policylaunch
Consent


CABLATO

Privacy policylaunch
Consent


WAYSTACK

Privacy policylaunch
Consent


TRESENSA

Privacy policylaunch
Consent


ADLUDIO

Privacy policylaunch
Consent

Accept all



Confirm choices

Close

Catch the Latest Trends and Insights. Subscribe Now. 

Get cybersecurity news, magazines, market trends reports, Cyble research blogs,
and more straight to your inbox. 

Name:
Email
Select your interest*
The Cyber Express Newsletter & Magazine
Cyble Products Demo
Cyble Research Blogs
Sign Up
Terms of Service

We do not sell or share your information with anyone.