Skip to main content
Industry & Standards lead hero image abstract pattern

Industry & Standards

Cyber Security News, Trends, Insights & Events

Experts say that devices—computers, mobile phones, smart TVs, and smart cars, for example—are the source of more than 2.5 quintillion bytes of data that are created each and every day. With this trend showing no signs of slowing down, efforts to eliminate or reduce vulnerabilities associated with data management are imperative to minimizing risk. From data breaches to malware that threatens critical infrastructure, cyber threats—specifically cybersecurity failures—can devastate governments, organizations and consumers alike.

Related content

Cybersecurity Techniques for Managing Networked Systems

Given the strong interest in both industry and academia in this area, this special issue aims at the timely publication of recent innovative research results on cybersecurity methods and techniques for managing networked systems.


IEEE Wireless Communications December 2018

The IEEE Wireless Communications December 2018 issue features the Special Issue on Security and Privacy in Wireless IoT.


Best Readings in Physical-Layer Security

In this Best Readings, we highlight overview articles, archival technical papers, as well as special issues on physical-layer security that are representative of physical-layer security today. While the list is far from exhaustive, the selected papers have been influential by identifying new problems, providing innovative and elegant solutions, pointing out important future directions, as well as reflecting on and rethinking the approaches undertaken to study physical-layer security.