Cyberactors are increasingly adopting traditional and innovative security measures to protect valuable information in the cyberworld. Information--and any aspect of it, such as its abundance, distortion, misuse, and value — governs the cyberworld. In this context, new actors are emerging alongside traditional ones with an essential role for intermediaries, who aim to systematically identify, handle, filter, monitor, and disseminate information. Cyberactors' changing roles highlight how interaction approaches, business models, and organizational practices relate to cybersecurity economics. Read full article »
About IEEE Security & Privacy
IEEE Security & Privacy magazine provides articles with both a practical and research bent by the top thinkers in the field along with case studies, tutorials, columns, and in-depth interviews and podcasts for the information security industry.
Cleaning up Web 2.0's Security Mess-at Least Partly
Because Web 2.0 applications often result in novel exploits, data leaks, or identity theft, the solution is to understand the attacks and assess how best to prevent them. Read full article »
A Communications Jamming Taxonomy
A taxonomy helps delineate between jamming in the original electronic warfare sense and wireless cybersecurity attacks, classifying communication jammers' theoretical behaviors and characteristics. Read full article »
After a year of denials, Volkswagen admitted in September 2015 that multiple makes and models of its diesel vehicles contained defeat device software. The decisions leading to "Dieselgate" involved a corruption of engineering ethics that the profession ought to address. Read full article »
Assessing the Federal Trade Commission's Privacy Assessments
"Assessments"—evaluations performed by outside accounting firms—are a key tool for regulators to detect privacy and security problems. However, these assessments are less intense than audits and fall short of what is needed to ensure that companies honor consumer privacy expectations. Read full article »
Authentication at Scale
Arguing that it's time to give up on elaborate password rules, Google Vice President of Security Eric Grosse and engineer Mayank Upadhyay present a better way to achieve stronger user identification. Read full article »
Silver Bullet Security Podcast with Gary McGraw
Silver Bullet Celebrates 10 Years! Marcus Ranum Interviews Gary McGraw To celebrate 10 straight years of the monthly Silver Bullet Security Podcast, we're flipping the mic. During the past decade, Dr. Gary McGraw has interviewed some of the security industry's most influential gurus. A globally recognized authority on security and software, he is the CTO of Cigital and the author of eight bestselling books on software security — and for the 120th Silver Bullet interview, he's not the one asking the questions. In this landmark episode, firewall inventor Marcus Ranum takes on the role of Silver Bullet host to interview Gary on a variety of topics including evolutionary biology and security, the Internet of Things, hard-core cyber insurgency, advisory board work, software security, tinfoil hats, the surveillance state, and more.Watch Marcus and Gary celebrate a decade of Silver Bullet in this special podcast and video edition. More podcast episodes »
Computer magazine, the IEEE Computer Society's flagship publication, covers all aspects of computer science, computer engineering, computing technology, and applications.
IEEE Annals of the History of Computing covers computer history with scholarly articles by leading computer scientists and historians, as well as first-hand accounts.
Cloud Computing magazine is committed to the timely publication of peer-reviewed articles that provide innovative research ideas, applications results, and case studies in all areas of cloud computing.
IEEE Computer Graphics and Applications magazine bridges the theory and practice of computer graphics, from specific algorithms to full system implementations.
Computing in Science & Engineering addresses the need for efficient algorithms, system software, and computer architecture to address large computational problems in the hard sciences.
IEEE Intelligent Systems magazine covers the theory and application of systems that perceive, reason, learn, and act intelligently.
IEEE Internet Computing is a crossroads for researchers and industry developers, providing journal-quality exploration and review of emerging and maturing Internet technologies and applications.
IT Professional magazine examines emerging technologies, security issues, data management techniques, and systems integration challenges and how they affect the enterprise.
IEEE Micro focuses on the technologies of computers and peripherals � systems, components, and subassemblies, as well as communications and software.
IEEE MultiMedia magazine serves readers who are interested in harmoniously using multiple media types to create new experiences.
IEEE Pervasive Computing explores pervasive, mobile, and ubiquitous computing for developers, researchers, and educators.
IEEE Security & Privacy presents research articles, case studies, tutorials, and columns for workers at all levels of the information security industry.
IEEE Software offers pioneering ideas, expert analyses, and thoughtful overviews for professional developers and managers who need to keep up with rapid technology change.