Latest Posts

Avoiding the Top 10 Security Design Flaws
Avoiding the Top 10 Security Design Flaws Most software built and released typically comes with a set of defects — implementation bugs and design flaws. While there has been a larger focus on finding bugs rather than on identifying flaws, this document intends ...
Read More
Read More

Cyber Security Vulnerability Navigator
IEEE has recently launched the IEEE Cyber Security Vulnerability Navigator. This interactive infographic, shared in a recent issue of the IEEE member publication THE INSTITUTE, highlights some of the online security threats that Chief Information Officers and Chief Technology Officers say are their biggest ...
Read More
Read More

Try Your Hand at Defeating Cyber Attacks
Are you seeking to brush up on your cyber security skills? Would you like some hands-on experience in defeating cyber attacks? The IEEE Cyber Security Initiative now offers virtualized computing containers, accessible online, where you can experience what it’s like to fight known exploits. Give yourself ...
Read More
Read More
Top Posts & Pages
- Improve Your English With Artificial Intelligence-Powered Apps
- European Union Considering “De Facto Global Standard” for AI
- IEEE Certificates Program
- IEEE Continuing Education Course Certificates
- The Advantages of the Finite Element Method
- Real-Life Use Cases for Edge Computing
- IEEE Spectrum Continuing Education Webinar Certificates
- Home
- What’s the Difference Between Wireless Standards IEEE 802.11ac and IEEE 802.11ax?
- The Smart Grid and Renewable Energy