Cybersecurity
-
Technologies for Authenticating Media in the Context of Deepfakes
Deepfakes represent a threat to the nature of truth and knowledge itself. But how effectively can content be labeled and authenticated, and what are the limits of authentication?
-
Bridging the Technologist/Policymaker Divide in Digital Privacy
The IEEE Digital Privacy Model provides a common starting point to drive privacy solutions that are predicated on individuals.
-
Why a Security Posture Assessment is Critical for Modern Organizations
Cyber-related cognizance, action, and resilience all have a common starting point: security posture assessment.
-
The Future of Cars: Safer, Smarter and More Connected
The time to address security concerns from increased digitization is now, to realize the full benefits of automotive innovation.
-
Congress Authorizes Defense Cyber and Digital Service Academy
A new DoD Cyber and Digital Service Academy will provide scholarships for up to five years to university students in cyber-related programs.