World Wide Cyber News
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH
World Wide Cyber News
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH
Owner

How the Marine Corps Uses IT to Defeat Evolving Threats
POLICY & GOVERNANCE
January 30, 2022

How the Marine Corps Uses IT to Defeat Evolving Threats

Each year, Marine Corps Systems Command acquires a range of ground-based innovations designed to meet…

0 Shares
Owner January 30, 2022
Privacy’s Evolutionary Roots May Help Shape Its Future in the Digital Age
EDUCATION & RESEARCH
January 20, 2022

Privacy’s Evolutionary Roots May Help Shape Its Future in the Digital Age

In a Policy Forum, Alessandro Acquisti and colleagues argue that the evolutionary roots of human…

0 Shares
Owner January 20, 2022
77% of U.S. Residents Concerned About Ransomware, IP Theft and Attacks on Critical Infrastructure
EDUCATION & RESEARCH
January 8, 2022

77% of U.S. Residents Concerned About Ransomware, IP Theft and Attacks on Critical Infrastructure

The MITRE-Harris Poll Survey on innovation found U.S. residents are broadly concerned about the nation’s…

0 Shares
Owner January 8, 2022
How Cybercriminals Turn Paper Checks Stolen from Mailboxes into Bitcoin
STRATEGY & THREATS
January 5, 2022

How Cybercriminals Turn Paper Checks Stolen from Mailboxes into Bitcoin

While cybercrime gets a lot of attention from law enforcement and the media these days,…

0 Shares
Owner January 5, 2022
A New Method to Make AI-Generated Voices More Expressive
EDUCATION & RESEARCH
January 5, 2022

A New Method to Make AI-Generated Voices More Expressive

Researchers have found a way to make AI-generated voices, such as digital personal assistants, more…

0 Shares
Owner January 5, 2022
In 2022, Hackers Will Have Companies That Fake Social Responsibility in the Crosshairs
STRATEGY & THREATS
January 5, 2022

In 2022, Hackers Will Have Companies That Fake Social Responsibility in the Crosshairs

Consumers and employees will be watching closely in 2022 to ensure that multinational corporations are…

0 Shares
Owner January 5, 2022
Computer Attacks with Laser Light
STRATEGY & THREATS
December 22, 2021

Computer Attacks with Laser Light

Computer systems that are physically isolated from the outside world (air-gapped) can still be attacked.…

0 Shares
Owner December 22, 2021
UTEP to Advance Cybersecurity Talent Pipeline with M Grant
EDUCATION & RESEARCH
December 21, 2021

UTEP to Advance Cybersecurity Talent Pipeline with $4M Grant

The University of Texas at El Paso will enhance the capacity of the regional and…

0 Shares
Owner December 21, 2021
Cybersecurity Professor Analyzes Economic Cost of Critical Infrastructure Disruptions
INDUSTRY & COMMERCE
December 21, 2021

Cybersecurity Professor Analyzes Economic Cost of Critical Infrastructure Disruptions

The resilience of America’s critical infrastructure networks has been tested over the last year by…

0 Shares
Owner December 21, 2021
U.S. NPS Gains Access to Joint Information Operations Range
EDUCATION & RESEARCH
December 16, 2021

U.S. NPS Gains Access to Joint Information Operations Range

The Naval Postgraduate School (NPS) has added a new capability to the university’s technological toolbelt…

0 Shares
Owner December 16, 2021
Older Posts Newer Posts
Latest Posts
  • Uncategorized
    Global Cyber Regulations: Why Fragmentation Is the Real Risk
    Jason February 18, 2026
  • Persistent Threat Actors and the New Logic of Cyber Power
    STRATEGY & THREATS
    Persistent Threat Actors and the New Logic of Cyber Power
    Jason February 8, 2026
  • Why Cybersecurity Education Must Move Beyond Certifications
    EDUCATION & RESEARCH
    Why Cybersecurity Education Must Move Beyond Certifications
    Jason February 8, 2026
  • How Cyber Risk Is Reshaping Business Strategy in 2026
    INDUSTRY & COMMERCE
    How Cyber Risk Is Reshaping Business Strategy in 2026
    Jason February 7, 2026
  • Building a Cybersecurity Workforce for Persistent State-Level Threats
    EDUCATION & RESEARCH
    Building a Cybersecurity Workforce for Persistent State-Level Threats
    Jason January 16, 2026
World Wide Cyber News
World Wide Cyber News
  • HOME
  • ABOUT US
  • PERMISSIONS AND POLICIES
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH

Our site uses cookies. Learn more about our use of cookies: Cookie Policy

ACCEPT