World Wide Cyber News
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH
World Wide Cyber News
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH
Owner

Considering Military Culture and Values When Adopting AI
POLICY & GOVERNANCE
June 25, 2020

Considering Military Culture and Values When Adopting AI

The advent of autonomous technologies and artificial intelligence (AI) may lead to an unprecedented shift…

0 Shares
Owner June 25, 2020
Software Flaws Often First Reported on Social Media Networks
STRATEGY & THREATS
May 13, 2020

Software Flaws Often First Reported on Social Media Networks

Software vulnerabilities are more likely to be discussed on social media before they’re revealed on…

0 Shares
Owner May 13, 2020
Firms Perceived to Fake Social Responsibility Become Targets for Hackers
INDUSTRY & COMMERCE
May 13, 2020

Firms Perceived to Fake Social Responsibility Become Targets for Hackers

Data breaches have become daily occurrences. Research firm Cybersecurity Ventures reveals that in 2018 hackers stole…

0 Shares
Owner May 13, 2020
It’s Not Me—It’s You: We Believe We’re Less Likely than Others Are to Fall for Online Scams
STRATEGY & THREATS
May 13, 2020

It’s Not Me—It’s You: We Believe We’re Less Likely than Others Are to Fall for Online Scams

We believe we are less likely than others are to fall for phishing scams, thereby…

0 Shares
Owner May 13, 2020
Protecting Yourself from the Latest Internet Sex Crime
STRATEGY & THREATS
April 22, 2020

Protecting Yourself from the Latest Internet Sex Crime

Researchers from Michigan State University released a study on “sextortion” – a lesser-known internet crime…

0 Shares
Owner April 22, 2020
DHS S&T Strengthens Mobile Device Email Security and Privacy
EDUCATION & RESEARCH
April 16, 2020

DHS S&T Strengthens Mobile Device Email Security and Privacy

Large and small organizations alike now rely heavily on mobile devices like smartphones or tablets…

0 Shares
Owner April 16, 2020
‘I Saw You Were Online’: How Online Status Indicators Shape Our Behavior
STRATEGY & THREATS
April 16, 2020

‘I Saw You Were Online’: How Online Status Indicators Shape Our Behavior

Some apps highlight when a person is online — and then share that information with…

0 Shares
Owner April 16, 2020
Cybersecurity, Tech Infrastructure Requires International Trust
POLICY & GOVERNANCE
April 16, 2020

Cybersecurity, Tech Infrastructure Requires International Trust

In new research published in the journal Technology and Culture, Rebecca Slayton, professor of science and…

0 Shares
Owner April 16, 2020
Penn State Engineer Receives DARPA Grant to Strengthen Cybersecurity
EDUCATION & RESEARCH
April 15, 2020

Penn State Engineer Receives DARPA Grant to Strengthen Cybersecurity

A parser, the element in a computer system that converts data inputs into an understandable…

0 Shares
Owner April 15, 2020
Zoom Should Be Criticized for Poor Communication Rather Than Privacy, Security
EDUCATION & RESEARCH
April 10, 2020

Zoom Should Be Criticized for Poor Communication Rather Than Privacy, Security

The video platform Zoom has experienced overnight success with offices and schools closed around the…

0 Shares
Owner April 10, 2020
Older Posts Newer Posts
Latest Posts
  • Uncategorized
    Global Cyber Regulations: Why Fragmentation Is the Real Risk
    Jason February 18, 2026
  • Persistent Threat Actors and the New Logic of Cyber Power
    STRATEGY & THREATS
    Persistent Threat Actors and the New Logic of Cyber Power
    Jason February 8, 2026
  • Why Cybersecurity Education Must Move Beyond Certifications
    EDUCATION & RESEARCH
    Why Cybersecurity Education Must Move Beyond Certifications
    Jason February 8, 2026
  • How Cyber Risk Is Reshaping Business Strategy in 2026
    INDUSTRY & COMMERCE
    How Cyber Risk Is Reshaping Business Strategy in 2026
    Jason February 7, 2026
  • Building a Cybersecurity Workforce for Persistent State-Level Threats
    EDUCATION & RESEARCH
    Building a Cybersecurity Workforce for Persistent State-Level Threats
    Jason January 16, 2026
World Wide Cyber News
World Wide Cyber News
  • HOME
  • ABOUT US
  • PERMISSIONS AND POLICIES
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH

Our site uses cookies. Learn more about our use of cookies: Cookie Policy

ACCEPT