Metanav

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

Latest Posts


Internet of Things

What Is the Internet of Things? A Beginner’s Guide

Forbes recently published an article that highlighted the possibilities and products of the Internet of Things, and how this technology will affect not only consumers but also businesses. From the article: “There’s no doubt, the Internet of Things is just getting started. Businesses who start ...

Ethical Hacking is a Critical Component of Network Security

Inside the Murky World of Hackers for Hire

Ethical hackers, those that identify the system vulnerabilities of organizations before they can be exploited by malicious hackers, perform a valuable service that is gaining increasing attention around the world. In this article from The Telegraph, learn about HackerOne, a network of self-employed ethical ...

IEEE Cybersecurity Infographic

Infographic: Cyber Security Threats

Recently, the IEEE member publication THE INSTITUTE, highlighted some of the online security threats that Chief Information Officers and Chief Technology Officers say are their biggest challenges. Exploring issues like Data Breaches, Compromised Credentials, Distributed Denial-of-Service (DDOS) Attacks and more. The infographic below illustrates some of these ...

IEEE Continuing Education Training: Internet of Things (IoT)

8 Ways the Internet of Things Will Impact Business

8 Ways the Internet of Things May Affect Your Business The Internet of Things is going to cause a revolution in the business world within the next few years, impacting everything from logistics to bandwidth and data storage to productivity efficiencies. In this ...

Internet of Things Wearables at CES 2017

Finding the Right Wearable

Internet of Things Wearables at CES 2017 The 2017 Consumer Electronics Show was, among other things, a showcase for the latest developments in Internet of Things (IoT) technologies. Wearables is a huge category in the Internet of Things, as consumers choose devices that do everything ...

Avoiding the Top 10 Security Design Flaws

Avoiding the Top 10 Security Design Flaws

Avoiding the Top 10 Security Design Flaws Most software built and released typically comes with a set of defects — implementation bugs and design flaws. While there has been a larger focus on finding bugs rather than on identifying flaws, this document intends ...

IEEE Cyber Security: Cyber Security Vulnerability Navigator

Cyber Security Vulnerability Navigator

IEEE has recently launched the IEEE Cyber Security Vulnerability Navigator. This interactive infographic, shared in a recent issue of the IEEE member publication THE INSTITUTE, highlights some of the online security threats that Chief Information Officers and Chief Technology Officers say are their biggest ...

IEEE Innovation at Work

Try Your Hand at Defeating Cyber Attacks

Are you seeking to brush up on your cyber security skills? Would you like some hands-on experience in defeating cyber attacks? The IEEE Cyber Security Initiative now offers virtualized computing containers, accessible online, where you can experience what it’s like to fight known exploits. Give yourself ...