Skip to main content
Industry & Standards lead hero image abstract pattern

Industry & Standards

Cyber Security News, Trends, Insights & Events

Experts say that devices—computers, mobile phones, smart TVs, and smart cars, for example—are the source of more than 2.5 quintillion bytes of data that are created each and every day. With this trend showing no signs of slowing down, efforts to eliminate or reduce vulnerabilities associated with data management are imperative to minimizing risk. From data breaches to malware that threatens critical infrastructure, cyber threats—specifically cybersecurity failures—can devastate governments, organizations and consumers alike.

Latest News

What the Count of Monte Cristo Can Teach Us About Cybersecurity
In 1844, Alexandre Dumas described a telecom hack based on insider threats and social engineering [IEEE Spectrum]

Related content

Best Readings in Physical-Layer Security

In this Best Readings, we highlight overview articles, archival technical papers, as well as special issues on physical-layer security that are representative of physical-layer security today. While the list is far from exhaustive, the selected papers have been influential by identifying new problems, providing innovative and elegant solutions, pointing out important future directions, as well as reflecting on and rethinking the approaches undertaken to study physical-layer security.


Best Readings in Communications and Information Systems Security

This Best Readings is on Communications and Information Systems Security (CIS).


IEEE Communications Magazine June 2016

The IEEE Communications Magazine June 2016 issue features topics in LTE-Advanced Pro, Bio-Inspired Cyber Security for Communications and Networking, Consumer Communications and Networking, Automotive Networking and Applications, and Radio Communications.