World Wide Cyber News
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH
World Wide Cyber News
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH
Owner

Questioning the Conventional Wisdom on Liability and Open Source Software
INDUSTRY & COMMERCE
April 18, 2024

Questioning the Conventional Wisdom on Liability and Open Source Software

To improve cybersecurity, open source software should not be completely exempt from software liability. A…

0 Shares
Owner April 18, 2024
How Google’s Location History Program Could Upend Digital Surveillance Law
POLICY & GOVERNANCE
April 18, 2024

How Google’s Location History Program Could Upend Digital Surveillance Law

Federal courts may eliminate Fourth Amendment protections for cell phone data based on dubious claims…

0 Shares
Owner April 18, 2024
Kyber Sprotyv: Ukraine’s Spec Ops in Cyberspace?
POLICY & GOVERNANCE
April 10, 2024

Kyber Sprotyv: Ukraine’s Spec Ops in Cyberspace?

A group with ties to the Ukrainian government is breaching the email accounts of Russian…

0 Shares
Owner April 10, 2024
Backdoor in XZ Utils That Almost Happened
INDUSTRY & COMMERCE
April 10, 2024

Backdoor in XZ Utils That Almost Happened

The recent cybersecurity catastrophe that wasn’t reveals an untenable situation, one being exploited by malicious…

0 Shares
Owner April 10, 2024
Undersea Cables Are the Unseen Backbone of the Global Internet
STRATEGY & THREATS
April 2, 2024

Undersea Cables Are the Unseen Backbone of the Global Internet

Have you ever wondered how an email sent from New York arrives in Sydney in…

0 Shares
Owner April 2, 2024
What Is Volt Typhoon? a Cybersecurity Expert Explains the Chinese Hackers Targeting Us Critical Infrastructure
STRATEGY & THREATS
April 2, 2024

What Is Volt Typhoon? a Cybersecurity Expert Explains the Chinese Hackers Targeting Us Critical Infrastructure

Volt Typhoon is a Chinese state-sponsored hacker group. The United States government and its primary…

0 Shares
Owner April 2, 2024
Research Reveals Language Barriers Limit Effectiveness of Cybersecurity Resources
EDUCATION & RESEARCH
April 1, 2024

Research Reveals Language Barriers Limit Effectiveness of Cybersecurity Resources

The idea for Fawn Ngo’s latest research came from a television interview. Ngo, a University…

0 Shares
Owner April 1, 2024
For Government Use of AI, What Gets Measured Gets Managed
POLICY & GOVERNANCE
April 1, 2024

For Government Use of AI, What Gets Measured Gets Managed

The immaturity of the AI measurement and evaluation ecosystem is a significant roadblock to the…

0 Shares
Owner April 1, 2024
To Govern AI, We Must Govern Compute
STRATEGY & THREATS
April 1, 2024

To Govern AI, We Must Govern Compute

Compute governance is a particularly important approach to AI governance because it is feasible. Computing…

0 Shares
Owner April 1, 2024
What Does Information Integrity Mean for Democracies?
POLICY & GOVERNANCE
March 25, 2024

What Does Information Integrity Mean for Democracies?

Disinformation is only a symptom of a much larger problem. Democracies around the world are…

0 Shares
Owner March 25, 2024
Older Posts Newer Posts
Latest Posts
  • Uncategorized
    Global Cyber Regulations: Why Fragmentation Is the Real Risk
    Jason February 18, 2026
  • Persistent Threat Actors and the New Logic of Cyber Power
    STRATEGY & THREATS
    Persistent Threat Actors and the New Logic of Cyber Power
    Jason February 8, 2026
  • Why Cybersecurity Education Must Move Beyond Certifications
    EDUCATION & RESEARCH
    Why Cybersecurity Education Must Move Beyond Certifications
    Jason February 8, 2026
  • How Cyber Risk Is Reshaping Business Strategy in 2026
    INDUSTRY & COMMERCE
    How Cyber Risk Is Reshaping Business Strategy in 2026
    Jason February 7, 2026
  • Building a Cybersecurity Workforce for Persistent State-Level Threats
    EDUCATION & RESEARCH
    Building a Cybersecurity Workforce for Persistent State-Level Threats
    Jason January 16, 2026
World Wide Cyber News
World Wide Cyber News
  • HOME
  • ABOUT US
  • PERMISSIONS AND POLICIES
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH

Our site uses cookies. Learn more about our use of cookies: Cookie Policy

ACCEPT