Skip to main content
Technical Activities Hero Image

Technical Activities

Cyber Security News, Trends, Insights & Events

Experts say that devices—computers, mobile phones, smart TVs, and smart cars, for example—are the source of more than 2.5 quintillion bytes of data that are created each and every day. With this trend showing no signs of slowing down, efforts to eliminate or reduce vulnerabilities associated with data management are imperative to minimizing risk. From data breaches to malware that threatens critical infrastructure, cyber threats—specifically cybersecurity failures—can devastate governments, organizations and consumers alike.

Related content

IEEE Communications Magazine March 2014

The IEEE Communications Magazine March 2014 issue features topics in Lessons of the Great East Japan Earthquake, Security in Wireless Multimedia Communications, Network Testing, and Radio Communications.

Publication

IEEE Communications Magazine August 2015

The IEEE Communications Magazine August 2015 issue features topics in Security and Privacy in Emerging Networks: Part 2, Energy Harvesting Communications, and Energy-Efficient Optical Networks.

Publication

IEEE Communications Magazine April 2015

The IEEE Communications Magazine April 2015 issue features topics in Energy Harvesting Communications, Network and Service Virtualization, Security and Privacy in Emerging Networks, Integrated Circuits for Communications, and Design and Implementation.

Publication