Latest Posts

What Is the Internet of Things? A Beginner’s Guide
Forbes recently published an article that highlighted the possibilities and products of the Internet of Things, and how this technology will affect not only consumers but also businesses. From the article: “There’s no doubt, the Internet of Things is just getting started. Businesses who start ...
Read More
Read More

Inside the Murky World of Hackers for Hire
Ethical hackers, those that identify the system vulnerabilities of organizations before they can be exploited by malicious hackers, perform a valuable service that is gaining increasing attention around the world. In this article from The Telegraph, learn about HackerOne, a network of self-employed ethical ...
Read More
Read More

Infographic: Cyber Security Threats
Recently, the IEEE member publication THE INSTITUTE, highlighted some of the online security threats that Chief Information Officers and Chief Technology Officers say are their biggest challenges. Exploring issues like Data Breaches, Compromised Credentials, Distributed Denial-of-Service (DDOS) Attacks and more. The infographic below illustrates some of these ...
Read More
Read More

8 Ways the Internet of Things Will Impact Business
8 Ways the Internet of Things May Affect Your Business The Internet of Things is going to cause a revolution in the business world within the next few years, impacting everything from logistics to bandwidth and data storage to productivity efficiencies. In this ...
Read More
Read More

Internet of Things Wearables at CES 2017 The 2017 Consumer Electronics Show was, among other things, a showcase for the latest developments in Internet of Things (IoT) technologies. Wearables is a huge category in the Internet of Things, as consumers choose devices that do everything ...
Read More
Read More

Avoiding the Top 10 Security Design Flaws
Avoiding the Top 10 Security Design Flaws Most software built and released typically comes with a set of defects — implementation bugs and design flaws. While there has been a larger focus on finding bugs rather than on identifying flaws, this document intends ...
Read More
Read More

Cyber Security Vulnerability Navigator
IEEE has recently launched the IEEE Cyber Security Vulnerability Navigator. This interactive infographic, shared in a recent issue of the IEEE member publication THE INSTITUTE, highlights some of the online security threats that Chief Information Officers and Chief Technology Officers say are their biggest ...
Read More
Read More

Try Your Hand at Defeating Cyber Attacks
Are you seeking to brush up on your cyber security skills? Would you like some hands-on experience in defeating cyber attacks? The IEEE Cyber Security Initiative now offers virtualized computing containers, accessible online, where you can experience what it’s like to fight known exploits. Give yourself ...
Read More
Read More
Top Posts & Pages
- Home
- What is ‘Causal Inference’ and Why is it Key to Machine Learning?
- IEEE Continuing Education Course Certificates
- The Benefits of Earning and Maintaining a Professional Engineer License
- Real-Life Use Cases for Edge Computing
- IEEE Certificates Program
- The Smart Grid and Renewable Energy
- The Advantages of the Finite Element Method
- Improve Your English With Artificial Intelligence-Powered Apps
- Vehicle to Grid (V2G) Technology