• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Publications
  • /Tech News
  • /Trends
  • Home
  • / ...
  • /Tech News
  • /Trends

Tech, Policy, and Research: How the Computer Science and Engineering Community Is Responding to Cybercrime

By IEEE Computer Society Team on
October 17, 2022

Computing community coming together on cybercrimeComputing community coming together on cybercrimeCybercrime continues to intensify around the globe. In fact, a new report from Check Point Research concluded that the first half of 2022 was met with a 42 percent increase in weekly cyberattacks globally, with every region experiencing a significant escalation.

While there is no silver bullet for thwarting attacks, growing cyber issues have increased the demand for advanced solutions to scan, evaluate, and ultimately safeguard against system and human vulnerabilities. That directive translates to novel approaches for both building infrastructure and shoring up data in ways that stay one step ahead of cybercriminals.

A Computer Science Role


“Advances in computer science and engineering will provide very good value to strengthen our cybersecurity protocols,” said Cyril Onwubiko, senior director, enterprise security architecture at Pearson - the world’s learning company. “These include big data, integration, and interoperability.”

Dr. Onwubiko points out that the more widespread accessibility and usability of big data have provided significant opportunities for strengthening security testing. Because data now exists in systems, sub systems, and different environments, cyber experts can apply it in varied testing protocols, which will improve system strength, and possibly even more important, confirm information veracity.


Want More Tech News? Subscribe to ComputingEdge Newsletter Today!


“Big data gives us trustworthiness,” noted Dr. Onwubiko. “We can confirm the data is reliable, quality data, and therefore we increase the efficacy of the results from those trials or tests. It gives us something that we didn’t have before.”

In addition, Dr. Onwubiko points to enhanced system integrations and technical interoperability as advanced pathways to cybersecurity research. These two developments enable information exchange in new ways and allow greater investigation of the hand-offs between systems. By exploring these hand-offs and systems’ individual and combined protocols, experts can strengthen security properties and identify and address potential limitations or liabilities.

The Policy Play


However, as the visibility of attacks and countermeasures gains the attention of global governments, the politics surrounding cybersecurity matter as much as the scientific and engineering developments. Technical advancements are leading to innovative solutions in the fight against cybercrime, but on a parallel track, policy issues are emerging, stemming from the solutions themselves as well as growing considerations around data privacy and individual protections. In fact, these implications have risen to top billing in the first three episodes of IEEE CS’ new security podcast, Over the Rainbow: 21st Century Security & Privacy.

“There’s a theme that runs through our early episodes, which is the extent to which government policy has profound influence on security, both on the market and on the definition of the problem and its solutions,” remarked Dr. Bob Blakley, operating partner, Team8, a global venture group based in New York and Tel Aviv, and the podcast’s cohost. “The interest in that arises partly because security is so difficult, and the technical measures alone are unlikely to solve the problem. Government incentives really matter, and work is being done by legislators and regulators to carve out an initial approach.”

Podcast cohost Dr. Lorrie Cranor, director, and Bosch Distinguished Professor, CyLab, Carnegie Mellon University, Pittsburgh, Pa., U.S.A., concurred, pointing to specific examples. “In academia, we’re seeing a trend toward applying AI and machine learning toward everything, and it will play a bigger role in security and in policy. On the privacy side of things, we may be nearing the reality of U.S. privacy legislation at the national level, and even if it doesn’t happen, it will have still changed the way people are thinking about privacy policy.”

The Future Landscape


Landing at the intersection of scientific development, policy considerations, and public impact, cybersecurity will remain a high-stakes topic for the near future, and one that demands ongoing support from the computer science and engineering community.

“There will be an increase in the cybersecurity UX [user experience],” noted Dr. Onwubiko. “Enterprise is driving digital transformation, new ways of working, and business models and is requiring more. There will be high demand for a cybersecurity user experience—one that is omnichannel across different platforms—which will require a massive technology core to support it frictionlessly, seamlessly, and securely.”

And with cybersecurity as a research focus on the rise, the workforce to support it will be an important future need—one that the computer science and engineering community can help fulfill.

“I would go back to something that [podcast guest] Michael Alan Specter said. You will get drawn into interdisciplinary issues, and you should embrace that,” noted Dr. Blakley. “Security is deep; you really have to understand the minutest details of a system to know where issues lie, but it’s also extremely broad, you have to be able to see how it fits into a big picture.”

Fortunately, leaders exemplifying both of those skill sets can be found within the computer science and engineering community.

“There are commonalities between computer science and engineering and cybersecurity; the same principles apply in both,” concluded Dr. Onwubiko. “Those in computer science and engineering that see cybersecurity as an area of interest should consider exploring it further.”

To dive deeper into the role computer science and engineering can play in cybersecurity, check out IEEE Security and Privacy magazine, the Computer Society’s Technical Community on Security and Privacy, and the IEEE S&P Conference.

LATEST NEWS
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Autonomous Observability: AI Agents That Debug AI
Autonomous Observability: AI Agents That Debug AI
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Copilot Ergonomics: UI Patterns that Reduce Cognitive Load
Copilot Ergonomics: UI Patterns that Reduce Cognitive Load
Read Next

IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT

Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)

Autonomous Observability: AI Agents That Debug AI

Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference

Copilot Ergonomics: UI Patterns that Reduce Cognitive Load

The Myth of AI Neutrality in Search Algorithms

Gen AI and LLMs: Rebuilding Trust in a Synthetic Information Age

How AI Is Transforming Fraud Detection in Financial Transactions

FacebookTwitterLinkedInInstagramYoutube
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter