World Wide Cyber News
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH
World Wide Cyber News
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH
Owner

Space Weather Threatens High-Tech Life
STRATEGY & THREATS
March 29, 2018

Space Weather Threatens High-Tech Life

Shortly after 4 a.m. on a crisp, cloudless September morning in 1859, the sky above…

0 Shares
Owner March 29, 2018
Is Counter-Attack Justified Against a State-Sponsored Cyber Attack? It’s a Legal Grey Area
STRATEGY & THREATS
March 29, 2018

Is Counter-Attack Justified Against a State-Sponsored Cyber Attack? It’s a Legal Grey Area

On March 23, the US Department of Justice commenced perhaps the largest prosecution of a…

0 Shares
Owner March 29, 2018
Improve Your Information Security by Giving Employees More Options
STRATEGY & THREATS
March 27, 2018

Improve Your Information Security by Giving Employees More Options

Computer users — at home and at work — often engage in behaviors that create…

0 Shares
Owner March 27, 2018
Nine Iranians Charged in Massive Hacking Campaign on Behalf of Iran Government
POLICY & GOVERNANCE
March 23, 2018

Nine Iranians Charged in Massive Hacking Campaign on Behalf of Iran Government

Nine Iranian citizens—working at the behest of the government of Iran—have been charged in a…

0 Shares
Owner March 23, 2018
Russian Physicists Reveal Material for High-Speed Quantum Internet
EDUCATION & RESEARCH
March 21, 2018

Russian Physicists Reveal Material for High-Speed Quantum Internet

The race for quantum computing is on: Industry giants, such as Google, IBM, and Microsoft,…

0 Shares
Owner March 21, 2018
Combination of Old and New Yields Novel Power Grid Cybersecurity Tool
INDUSTRY & COMMERCE
March 20, 2018

Combination of Old and New Yields Novel Power Grid Cybersecurity Tool

An innovative R&D project led by Berkeley Lab researchers that combines cybersecurity, machine learning algorithms…

0 Shares
Owner March 20, 2018
New UTSA Study Presents Method to Stop Cyber Attacks on GPS-Enabled Devices
STRATEGY & THREATS
March 20, 2018

New UTSA Study Presents Method to Stop Cyber Attacks on GPS-Enabled Devices

A new study by researchers Nikolaos Gatsis, David Akopian and Ahmad F. Taha and their…

0 Shares
Owner March 20, 2018
DHS Announces Release of New Cybersecurity Research Portfolio and Technology Guides
POLICY & GOVERNANCE
March 12, 2018

DHS Announces Release of New Cybersecurity Research Portfolio and Technology Guides

The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has released two new guides that…

0 Shares
Owner March 12, 2018
World Economic Forum Convenes New Consortium to Address Fintech Cybersecurity
INDUSTRY & COMMERCE
March 7, 2018

World Economic Forum Convenes New Consortium to Address Fintech Cybersecurity

  The World Economic Forum on Tuesday announced the creation of a new consortium to…

0 Shares
Owner March 7, 2018
Global Study Reveals Cybersecurity Professionals Believe a Catastrophic Data Breach to Their Organization Is Inevitable
INDUSTRY & COMMERCE
March 5, 2018

Global Study Reveals Cybersecurity Professionals Believe a Catastrophic Data Breach to Their Organization Is Inevitable

A new global cybersecurity study commissioned by Raytheon, in partnership with Ponemon Institute, reveals a…

0 Shares
Owner March 5, 2018
Older Posts Newer Posts
Latest Posts
  • Uncategorized
    Global Cyber Regulations: Why Fragmentation Is the Real Risk
    Jason February 18, 2026
  • Persistent Threat Actors and the New Logic of Cyber Power
    STRATEGY & THREATS
    Persistent Threat Actors and the New Logic of Cyber Power
    Jason February 8, 2026
  • Why Cybersecurity Education Must Move Beyond Certifications
    EDUCATION & RESEARCH
    Why Cybersecurity Education Must Move Beyond Certifications
    Jason February 8, 2026
  • How Cyber Risk Is Reshaping Business Strategy in 2026
    INDUSTRY & COMMERCE
    How Cyber Risk Is Reshaping Business Strategy in 2026
    Jason February 7, 2026
  • Building a Cybersecurity Workforce for Persistent State-Level Threats
    EDUCATION & RESEARCH
    Building a Cybersecurity Workforce for Persistent State-Level Threats
    Jason January 16, 2026
World Wide Cyber News
World Wide Cyber News
  • HOME
  • ABOUT US
  • PERMISSIONS AND POLICIES
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH

Our site uses cookies. Learn more about our use of cookies: Cookie Policy

ACCEPT