Skip to main content
Technical Activities Hero Image

Technical Activities

Cyber Security News, Trends, Insights & Events

Experts say that devices—computers, mobile phones, smart TVs, and smart cars, for example—are the source of more than 2.5 quintillion bytes of data that are created each and every day. With this trend showing no signs of slowing down, efforts to eliminate or reduce vulnerabilities associated with data management are imperative to minimizing risk. From data breaches to malware that threatens critical infrastructure, cyber threats—specifically cybersecurity failures—can devastate governments, organizations and consumers alike.

Related content

5G Security: Can 5G Be Verifiably Secure?

This Feature Topic (FT) aims at putting together various paradigms and techniques needed to address 5G security in a holistic manner.


Free Tutorial on Challenges and Development for 5G Wireless Network Security

This tutorial covers the topics on the recent development of security for next generation mobile wireless networks, with focusing on 4G (LTE and LTE-A) and 5G mobile wireless network systems, followed by a discussion on the challenges and open research issues for 5G wireless network security.


IEEE International Conference on Cloud Networking 2019

IEEE CLOUDNET 2019 - IEEE International Conference on Cloud Networking. Cloud computing has emerged as a promising direction for cost-efficient and reliable service delivery across data communication networks.