Metanav

  • 20-EA-332C-AutomotiveCyberSecurityAd-FNL-ORG-940x260_title

    Ideal for technical professionals who need to understand automotive cyber security evolution, this five-course program explores cyber security issues, vehicular data collection, and automotive applications of blockchain technology.
    Learn more

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

Latest Posts


Ethical Hacking is a Critical Component of Network Security

Inside the Murky World of Hackers for Hire

Ethical hackers, those that identify the system vulnerabilities of organizations before they can be exploited by malicious hackers, perform a valuable service that is gaining increasing attention around the world. In this article from The Telegraph, learn about HackerOne, a network of self-employed ethical ...
Read More
IEEE Cybersecurity Infographic

Infographic: Cyber Security Threats

Recently, the IEEE member publication THE INSTITUTE, highlighted some of the online security threats that Chief Information Officers and Chief Technology Officers say are their biggest challenges. Exploring issues like Data Breaches, Compromised Credentials, Distributed Denial-of-Service (DDOS) Attacks and more. The infographic below illustrates some of these ...
Read More
IEEE Continuing Education Training: Internet of Things (IoT)

8 Ways the Internet of Things Will Impact Business

8 Ways the Internet of Things May Affect Your Business The Internet of Things is going to cause a revolution in the business world within the next few years, impacting everything from logistics to bandwidth and data storage to productivity efficiencies. In this ...
Read More
Internet of Things Wearables at CES 2017

Finding the Right Wearable

Internet of Things Wearables at CES 2017 The 2017 Consumer Electronics Show was, among other things, a showcase for the latest developments in Internet of Things (IoT) technologies. Wearables is a huge category in the Internet of Things, as consumers choose devices that do everything ...
Read More
Avoiding the Top 10 Security Design Flaws

Avoiding the Top 10 Security Design Flaws

Avoiding the Top 10 Security Design Flaws Most software built and released typically comes with a set of defects — implementation bugs and design flaws. While there has been a larger focus on finding bugs rather than on identifying flaws, this document intends ...
Read More
IEEE Cyber Security: Cyber Security Vulnerability Navigator

Cyber Security Vulnerability Navigator

IEEE has recently launched the IEEE Cyber Security Vulnerability Navigator. This interactive infographic, shared in a recent issue of the IEEE member publication THE INSTITUTE, highlights some of the online security threats that Chief Information Officers and Chief Technology Officers say are their biggest ...
Read More
IEEE Innovation at Work

Try Your Hand at Defeating Cyber Attacks

Are you seeking to brush up on your cyber security skills? Would you like some hands-on experience in defeating cyber attacks? The IEEE Cyber Security Initiative now offers virtualized computing containers, accessible online, where you can experience what it’s like to fight known exploits. Give yourself ...
Read More