World Wide Cyber News
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH
World Wide Cyber News
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH
Owner

Most People Overlook Artificial Intelligence Despite Flawless Advice
POLICY & GOVERNANCE
February 4, 2019

Most People Overlook Artificial Intelligence Despite Flawless Advice

If you were convinced you knew the way home, would you still turn on your…

0 Shares
Owner February 4, 2019
Atari Master: New AI Smashes Google Deepmind in Video Game Challenge
EDUCATION & RESEARCH
February 4, 2019

Atari Master: New AI Smashes Google Deepmind in Video Game Challenge

A new breed of algorithms has mastered Atari video games 10 times faster than state-of-the-art…

0 Shares
Owner February 4, 2019
Better Safeguards for Sensitive Information
STRATEGY & THREATS
January 29, 2019

Better Safeguards for Sensitive Information

Despite being the most advanced quantum technology, secure encryption of information units based on a…

0 Shares
Owner January 29, 2019
Quantifying How Much Quantum Information Can Be Eavesdropped
STRATEGY & THREATS
January 29, 2019

Quantifying How Much Quantum Information Can Be Eavesdropped

The most basic type of quantum information processing is quantum entanglement. In a new study…

0 Shares
Owner January 29, 2019
Defending Against Cyberattacks by Giving Attackers ‘False Hope’
EDUCATION & RESEARCH
January 29, 2019

Defending Against Cyberattacks by Giving Attackers ‘False Hope’

With almost every online purchase, a person’s personal information — name, date of birth and…

0 Shares
Owner January 29, 2019
The Hidden Treasure of Digital Piracy? Can Boost Bottom Line for Manufacturers, Retailers
INDUSTRY & COMMERCE
January 29, 2019

The Hidden Treasure of Digital Piracy? Can Boost Bottom Line for Manufacturers, Retailers

HBO’s popular television series “Game of Thrones” returns in April, but millions of fans continue…

0 Shares
Owner January 29, 2019
Identifying Artificial Intelligence ‘Blind Spots’
STRATEGY & THREATS
January 29, 2019

Identifying Artificial Intelligence ‘Blind Spots’

A novel model developed by MIT and Microsoft researchers identifies instances in which autonomous systems…

0 Shares
Owner January 29, 2019
Here’s How We Can Tackle the Growing Cybersecurity Skills Gap
EDUCATION & RESEARCH
January 24, 2019

Here’s How We Can Tackle the Growing Cybersecurity Skills Gap

More organizations than ever are conducting business online. An expanding digital footprint and increasingly sophisticated…

0 Shares
Owner January 24, 2019
People Think and Behave Differently in Virtual Reality Than They Do in Real Life
EDUCATION & RESEARCH
January 24, 2019

People Think and Behave Differently in Virtual Reality Than They Do in Real Life

Immersive virtual reality (VR) can be remarkably lifelike, but new University of British Columbia (UBC)…

0 Shares
Owner January 24, 2019
Surveillance in Our Schools
EDUCATION & RESEARCH
January 22, 2019

Surveillance in Our Schools

“Happier Classrooms: the simple way to build an amazing classroom community.” So reads the message…

0 Shares
Owner January 22, 2019
Older Posts Newer Posts
Latest Posts
  • Uncategorized
    Global Cyber Regulations: Why Fragmentation Is the Real Risk
    Jason February 18, 2026
  • Persistent Threat Actors and the New Logic of Cyber Power
    STRATEGY & THREATS
    Persistent Threat Actors and the New Logic of Cyber Power
    Jason February 8, 2026
  • Why Cybersecurity Education Must Move Beyond Certifications
    EDUCATION & RESEARCH
    Why Cybersecurity Education Must Move Beyond Certifications
    Jason February 8, 2026
  • How Cyber Risk Is Reshaping Business Strategy in 2026
    INDUSTRY & COMMERCE
    How Cyber Risk Is Reshaping Business Strategy in 2026
    Jason February 7, 2026
  • Building a Cybersecurity Workforce for Persistent State-Level Threats
    EDUCATION & RESEARCH
    Building a Cybersecurity Workforce for Persistent State-Level Threats
    Jason January 16, 2026
World Wide Cyber News
World Wide Cyber News
  • HOME
  • ABOUT US
  • PERMISSIONS AND POLICIES
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH

Our site uses cookies. Learn more about our use of cookies: Cookie Policy

ACCEPT