Cyberspace and Energy Management

January/February 2016

IT Professional magazine cover

Cyberinterventions such as attacks and exploitations could have a severe impact on people's everyday activities. In this context, we must understand the dimensions and scope of attacks in cyberspace and assess measures to enhance the security of cybersystems. A global scenario should be considered given that entities could involve individuals, organizations, and state-sponsored actors. Read full article »

About IT Professional

IT Professional offers solid, peer-reviewed information about today's strategic technology issues. To meet the challenges of running reliable, flexible enterprises, IT managers and technical leads rely on IT Pro for state-of-the-art solutions.

Articles from IT Professional

Protecting Digital Assets: Legal Protections Do Not Equal Practical Security

Protecting Digital Assets: Legal Protections Do Not Equal Practical Security

Constitutional privacy protections are difficult to apply to digital assets due to the Internet's public nature. Until a functional legal paradigm emerges, users should protect themselves. Read full article »

Establishing and Maintaining Trust in a Mobile Device

Establishing and Maintaining Trust in a Mobile Device

MobileRoT, a project sponsored by the Department of Homeland Security Advanced Research Projects Agency, is creating highly trustworthy, tamper-evident components for mobile devices. Read full article »

Announcements

Call for Papers

Cybersecurity and Privacy
Submission deadline: 1 February 2016
Publication: September/October 2016

Digital Innovation and Strategic Transformation
Submission deadline: 1 April 2016
Publication: November/December 2016