Everyone is afraid of every website but their own
- Show all
- Ad ops/ revenue
- Adtech platforms
- Advertisers
- Blockers
- Consent Management Platform
- Cryptomining
- Cybersecurity
- Data compliance
- Digital vendor risk management
- Fake News
- Formjacking
- Fraud
- Malvertisers
- Malware
- Mobile apps
- Phishing
- Political
- Quality
- retail media
- Scams
- Security
- Sensitive Categories
- Standards
- TCF and GVL support
- Third party code
- Vulnerabilities
- Website scanning
- Website security
- In the News
Cybercriminals Leveraging Encryption
Read MoreUsman Rahim, Digital Security & Operations Manager at The Media Trust tells Information Security Buzz that since only on average only 20% of code is owned and …
- In the News
Formjacking Attacks Pose New Threat for Internet Users
Read MoreThe Media Trust CEO Chris Olson tells CPO Magazine that e-commerce companies should closely monitor the third party cookies and software technologies that run …
- In the News
MY TAKE: Why the next web-delivered ad you encounter could invisibly infect your smartphone
Read MoreChris Olson, The Media Trust CEO, talks to Security Boulevard about the need to address the risks digital third parties introduce to the digital media supply c…
- In the News
Equifax Partner Breach
Read MoreThe Media Trust CEO Chris Olson tells Information Security Buzz that third parties are an organization’s weakest links in the digital supply chain, and bad act…
- In the News
Senate Call For Data Security Laws In Wake Of Marriott Breach
Read MoreThe Media Trust CEO Chris Olson suggests that closely watching third party code will dramatically reduce the incidence of digital ad fraud.
- In the News
The cookie conundrum: Complexity for publishers in the age of ecommerce and cybercrime rings
Read MoreThe Media Trust CEO shares his insights into the pitfalls and opportunities of today's cookie-driven e-commerce.
- In the News
Critical WordPress Plugin Flaw Grants Admin Access to Any Registered Site User
Read MoreStrategic Partnerships Officer Alex Calic talks to Threat Post about how the vulnerabilities of third parties make them ideal targets for bad actors.