CINXE.COM

Cyber Security Resources - IEEE Innovation at Work

<!DOCTYPE html> <html lang="en-US"> <head> <meta charset="UTF-8" /> <title>Cyber Security Resources - IEEE Innovation at Work</title> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <link rel="pingback" href="https://innovationatwork.ieee.org/xmlrpc.php" /> <!-- Google Tag Manager --> <!-- Container 1 --> <script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-M2GZK7M');</script> <!-- Container 2 --> <script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-KKPCDLN');</script> <!-- End Google Tag Manager --> <meta name='robots' content='index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1' /> <!-- Mobile viewport scale --> <meta name="viewport" content="width=device-width, initial-scale=1"/> <!-- This site is optimized with the Yoast SEO plugin v23.9 - https://yoast.com/wordpress/plugins/seo/ --> <meta name="description" content="Discover cyber security resources from IEEE, and learn how you can develop cyber security skills to advance your engineering career." /> <link rel="canonical" href="https://innovationatwork.ieee.org/cyber-security/" /> <meta property="og:locale" content="en_US" /> <meta property="og:type" content="article" /> <meta property="og:title" content="Cyber Security Resources - IEEE Innovation at Work" /> <meta property="og:description" content="Discover cyber security resources from IEEE, and learn how you can develop cyber security skills to advance your engineering career." /> <meta property="og:url" content="https://innovationatwork.ieee.org/cyber-security/" /> <meta property="og:site_name" content="IEEE Innovation at Work" /> <meta property="article:publisher" content="https://www.facebook.com/ieee.continuing.education/" /> <meta property="article:modified_time" content="2018-08-28T12:05:11+00:00" /> <meta name="twitter:card" content="summary_large_image" /> <meta name="twitter:site" content="@IEEELearn" /> <meta name="twitter:label1" content="Est. reading time" /> <meta name="twitter:data1" content="1 minute" /> <script type="application/ld+json" class="yoast-schema-graph">{"@context":"https://schema.org","@graph":[{"@type":"WebPage","@id":"https://innovationatwork.ieee.org/cyber-security/","url":"https://innovationatwork.ieee.org/cyber-security/","name":"Cyber Security Resources - IEEE Innovation at Work","isPartOf":{"@id":"https://innovationatwork.ieee.org/#website"},"datePublished":"2017-03-28T21:18:18+00:00","dateModified":"2018-08-28T12:05:11+00:00","description":"Discover cyber security resources from IEEE, and learn how you can develop cyber security skills to advance your engineering career.","breadcrumb":{"@id":"https://innovationatwork.ieee.org/cyber-security/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https://innovationatwork.ieee.org/cyber-security/"]}]},{"@type":"BreadcrumbList","@id":"https://innovationatwork.ieee.org/cyber-security/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://innovationatwork.ieee.org/"},{"@type":"ListItem","position":2,"name":"Cyber Security Resources"}]},{"@type":"WebSite","@id":"https://innovationatwork.ieee.org/#website","url":"https://innovationatwork.ieee.org/","name":"IEEE Innovation at Work","description":"Preparing your organization for emerging technologies","publisher":{"@id":"https://innovationatwork.ieee.org/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https://innovationatwork.ieee.org/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https://innovationatwork.ieee.org/#organization","name":"IEEE","url":"https://innovationatwork.ieee.org/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://innovationatwork.ieee.org/#/schema/logo/image/","url":"https://innovationatwork.ieee.org/wp-content/uploads/2015/06/transparent-blue.png","contentUrl":"https://innovationatwork.ieee.org/wp-content/uploads/2015/06/transparent-blue.png","width":200,"height":72,"caption":"IEEE"},"image":{"@id":"https://innovationatwork.ieee.org/#/schema/logo/image/"},"sameAs":["https://www.facebook.com/ieee.continuing.education/","https://x.com/IEEELearn"]}]}</script> <!-- / Yoast SEO plugin. --> <link rel='dns-prefetch' href='//static.addtoany.com' /> <link rel="alternate" type="application/rss+xml" title="IEEE Innovation at Work &raquo; Feed" href="https://innovationatwork.ieee.org/feed/" /> <link rel="alternate" type="application/rss+xml" title="IEEE Innovation at Work &raquo; Comments Feed" href="https://innovationatwork.ieee.org/comments/feed/" /> <link rel="alternate" type="text/calendar" title="IEEE Innovation at Work &raquo; iCal Feed" href="https://innovationatwork.ieee.org/events/?ical=1" /> <script type="text/javascript"> /* <![CDATA[ */ window._wpemojiSettings = {"baseUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/","ext":".png","svgUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/svg\/","svgExt":".svg","source":{"concatemoji":"https:\/\/innovationatwork.ieee.org\/wp-includes\/js\/wp-emoji-release.min.js?ver=6.6.1"}}; /*! This file is auto-generated */ !function(i,n){var o,s,e;function c(e){try{var t={supportTests:e,timestamp:(new Date).valueOf()};sessionStorage.setItem(o,JSON.stringify(t))}catch(e){}}function p(e,t,n){e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(t,0,0);var t=new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data),r=(e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(n,0,0),new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data));return t.every(function(e,t){return e===r[t]})}function u(e,t,n){switch(t){case"flag":return n(e,"\ud83c\udff3\ufe0f\u200d\u26a7\ufe0f","\ud83c\udff3\ufe0f\u200b\u26a7\ufe0f")?!1:!n(e,"\ud83c\uddfa\ud83c\uddf3","\ud83c\uddfa\u200b\ud83c\uddf3")&&!n(e,"\ud83c\udff4\udb40\udc67\udb40\udc62\udb40\udc65\udb40\udc6e\udb40\udc67\udb40\udc7f","\ud83c\udff4\u200b\udb40\udc67\u200b\udb40\udc62\u200b\udb40\udc65\u200b\udb40\udc6e\u200b\udb40\udc67\u200b\udb40\udc7f");case"emoji":return!n(e,"\ud83d\udc26\u200d\u2b1b","\ud83d\udc26\u200b\u2b1b")}return!1}function f(e,t,n){var r="undefined"!=typeof WorkerGlobalScope&&self instanceof WorkerGlobalScope?new OffscreenCanvas(300,150):i.createElement("canvas"),a=r.getContext("2d",{willReadFrequently:!0}),o=(a.textBaseline="top",a.font="600 32px Arial",{});return e.forEach(function(e){o[e]=t(a,e,n)}),o}function t(e){var t=i.createElement("script");t.src=e,t.defer=!0,i.head.appendChild(t)}"undefined"!=typeof Promise&&(o="wpEmojiSettingsSupports",s=["flag","emoji"],n.supports={everything:!0,everythingExceptFlag:!0},e=new Promise(function(e){i.addEventListener("DOMContentLoaded",e,{once:!0})}),new Promise(function(t){var n=function(){try{var e=JSON.parse(sessionStorage.getItem(o));if("object"==typeof e&&"number"==typeof e.timestamp&&(new Date).valueOf()<e.timestamp+604800&&"object"==typeof e.supportTests)return e.supportTests}catch(e){}return null}();if(!n){if("undefined"!=typeof Worker&&"undefined"!=typeof OffscreenCanvas&&"undefined"!=typeof URL&&URL.createObjectURL&&"undefined"!=typeof Blob)try{var e="postMessage("+f.toString()+"("+[JSON.stringify(s),u.toString(),p.toString()].join(",")+"));",r=new Blob([e],{type:"text/javascript"}),a=new Worker(URL.createObjectURL(r),{name:"wpTestEmojiSupports"});return void(a.onmessage=function(e){c(n=e.data),a.terminate(),t(n)})}catch(e){}c(n=f(s,u,p))}t(n)}).then(function(e){for(var t in e)n.supports[t]=e[t],n.supports.everything=n.supports.everything&&n.supports[t],"flag"!==t&&(n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&n.supports[t]);n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&!n.supports.flag,n.DOMReady=!1,n.readyCallback=function(){n.DOMReady=!0}}).then(function(){return e}).then(function(){var e;n.supports.everything||(n.readyCallback(),(e=n.source||{}).concatemoji?t(e.concatemoji):e.wpemoji&&e.twemoji&&(t(e.twemoji),t(e.wpemoji)))}))}((window,document),window._wpemojiSettings); /* ]]> */ </script> <link rel='stylesheet' id='pt-cv-public-style-css' href='https://innovationatwork.ieee.org/wp-content/plugins/content-views-query-and-display-post-page/public/assets/css/cv.css?ver=4.0.2' type='text/css' media='all' /> <style id='wp-emoji-styles-inline-css' type='text/css'> img.wp-smiley, img.emoji { display: inline !important; border: none !important; box-shadow: none !important; height: 1em !important; width: 1em !important; margin: 0 0.07em !important; vertical-align: -0.1em !important; background: none !important; padding: 0 !important; } </style> <link rel='stylesheet' id='wp-block-library-css' href='https://innovationatwork.ieee.org/wp-includes/css/dist/block-library/style.min.css?ver=6.6.1' type='text/css' media='all' /> <style id='classic-theme-styles-inline-css' type='text/css'> /*! This file is auto-generated */ .wp-block-button__link{color:#fff;background-color:#32373c;border-radius:9999px;box-shadow:none;text-decoration:none;padding:calc(.667em + 2px) calc(1.333em + 2px);font-size:1.125em}.wp-block-file__button{background:#32373c;color:#fff;text-decoration:none} </style> <style id='global-styles-inline-css' type='text/css'> :root{--wp--preset--aspect-ratio--square: 1;--wp--preset--aspect-ratio--4-3: 4/3;--wp--preset--aspect-ratio--3-4: 3/4;--wp--preset--aspect-ratio--3-2: 3/2;--wp--preset--aspect-ratio--2-3: 2/3;--wp--preset--aspect-ratio--16-9: 16/9;--wp--preset--aspect-ratio--9-16: 9/16;--wp--preset--color--black: #000000;--wp--preset--color--cyan-bluish-gray: #abb8c3;--wp--preset--color--white: #ffffff;--wp--preset--color--pale-pink: #f78da7;--wp--preset--color--vivid-red: #cf2e2e;--wp--preset--color--luminous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid-amber: #fcb900;--wp--preset--color--light-green-cyan: #7bdcb5;--wp--preset--color--vivid-green-cyan: #00d084;--wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivid-cyan-blue: #0693e3;--wp--preset--color--vivid-purple: #9b51e0;--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple: linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%);--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan: linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange: linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 100%);--wp--preset--gradient--luminous-vivid-orange-to-vivid-red: linear-gradient(135deg,rgba(255,105,0,1) 0%,rgb(207,46,46) 100%);--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray: linear-gradient(135deg,rgb(238,238,238) 0%,rgb(169,184,195) 100%);--wp--preset--gradient--cool-to-warm-spectrum: linear-gradient(135deg,rgb(74,234,220) 0%,rgb(151,120,209) 20%,rgb(207,42,186) 40%,rgb(238,44,130) 60%,rgb(251,105,98) 80%,rgb(254,248,76) 100%);--wp--preset--gradient--blush-light-purple: linear-gradient(135deg,rgb(255,206,236) 0%,rgb(152,150,240) 100%);--wp--preset--gradient--blush-bordeaux: linear-gradient(135deg,rgb(254,205,165) 0%,rgb(254,45,45) 50%,rgb(107,0,62) 100%);--wp--preset--gradient--luminous-dusk: linear-gradient(135deg,rgb(255,203,112) 0%,rgb(199,81,192) 50%,rgb(65,88,208) 100%);--wp--preset--gradient--pale-ocean: linear-gradient(135deg,rgb(255,245,203) 0%,rgb(182,227,212) 50%,rgb(51,167,181) 100%);--wp--preset--gradient--electric-grass: linear-gradient(135deg,rgb(202,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight: linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small: 13px;--wp--preset--font-size--medium: 20px;--wp--preset--font-size--large: 36px;--wp--preset--font-size--x-large: 42px;--wp--preset--spacing--20: 0.44rem;--wp--preset--spacing--30: 0.67rem;--wp--preset--spacing--40: 1rem;--wp--preset--spacing--50: 1.5rem;--wp--preset--spacing--60: 2.25rem;--wp--preset--spacing--70: 3.38rem;--wp--preset--spacing--80: 5.06rem;--wp--preset--shadow--natural: 6px 6px 9px rgba(0, 0, 0, 0.2);--wp--preset--shadow--deep: 12px 12px 50px rgba(0, 0, 0, 0.4);--wp--preset--shadow--sharp: 6px 6px 0px rgba(0, 0, 0, 0.2);--wp--preset--shadow--outlined: 6px 6px 0px -3px rgba(255, 255, 255, 1), 6px 6px rgba(0, 0, 0, 1);--wp--preset--shadow--crisp: 6px 6px 0px rgba(0, 0, 0, 1);}:where(.is-layout-flex){gap: 0.5em;}:where(.is-layout-grid){gap: 0.5em;}body .is-layout-flex{display: flex;}.is-layout-flex{flex-wrap: wrap;align-items: center;}.is-layout-flex > :is(*, div){margin: 0;}body .is-layout-grid{display: grid;}.is-layout-grid > :is(*, div){margin: 0;}:where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;}:where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;}.has-black-color{color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-color{color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-color{color: var(--wp--preset--color--white) !important;}.has-pale-pink-color{color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-color{color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-color{color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-color{color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-color{color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-color{color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-color{color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-color{color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-color{color: var(--wp--preset--color--vivid-purple) !important;}.has-black-background-color{background-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-background-color{background-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-background-color{background-color: var(--wp--preset--color--white) !important;}.has-pale-pink-background-color{background-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-background-color{background-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-background-color{background-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-background-color{background-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-background-color{background-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-background-color{background-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-background-color{background-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-background-color{background-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-background-color{background-color: var(--wp--preset--color--vivid-purple) !important;}.has-black-border-color{border-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-border-color{border-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-border-color{border-color: var(--wp--preset--color--white) !important;}.has-pale-pink-border-color{border-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-border-color{border-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-border-color{border-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-border-color{border-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-border-color{border-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-border-color{border-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-border-color{border-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-border-color{border-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-border-color{border-color: var(--wp--preset--color--vivid-purple) !important;}.has-vivid-cyan-blue-to-vivid-purple-gradient-background{background: var(--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple) !important;}.has-light-green-cyan-to-vivid-green-cyan-gradient-background{background: var(--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan) !important;}.has-luminous-vivid-amber-to-luminous-vivid-orange-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange) !important;}.has-luminous-vivid-orange-to-vivid-red-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-orange-to-vivid-red) !important;}.has-very-light-gray-to-cyan-bluish-gray-gradient-background{background: var(--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray) !important;}.has-cool-to-warm-spectrum-gradient-background{background: var(--wp--preset--gradient--cool-to-warm-spectrum) !important;}.has-blush-light-purple-gradient-background{background: var(--wp--preset--gradient--blush-light-purple) !important;}.has-blush-bordeaux-gradient-background{background: var(--wp--preset--gradient--blush-bordeaux) !important;}.has-luminous-dusk-gradient-background{background: var(--wp--preset--gradient--luminous-dusk) !important;}.has-pale-ocean-gradient-background{background: var(--wp--preset--gradient--pale-ocean) !important;}.has-electric-grass-gradient-background{background: var(--wp--preset--gradient--electric-grass) !important;}.has-midnight-gradient-background{background: var(--wp--preset--gradient--midnight) !important;}.has-small-font-size{font-size: var(--wp--preset--font-size--small) !important;}.has-medium-font-size{font-size: var(--wp--preset--font-size--medium) !important;}.has-large-font-size{font-size: var(--wp--preset--font-size--large) !important;}.has-x-large-font-size{font-size: var(--wp--preset--font-size--x-large) !important;} :where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;} :where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;} :root :where(.wp-block-pullquote){font-size: 1.5em;line-height: 1.6;} </style> <link rel='stylesheet' id='contact-form-7-css' href='https://innovationatwork.ieee.org/wp-content/plugins/contact-form-7/includes/css/styles.css?ver=6.0' type='text/css' media='all' /> <link rel='stylesheet' id='siteorigin-panels-front-css' href='https://innovationatwork.ieee.org/wp-content/plugins/siteorigin-panels/css/front-flex.min.css?ver=2.31.0' type='text/css' media='all' /> <link rel='stylesheet' id='sow-image-default-e4c2d9f6c920-css' href='https://innovationatwork.ieee.org/wp-content/uploads/siteorigin-widgets/sow-image-default-e4c2d9f6c920.css?ver=6.6.1' type='text/css' media='all' /> <link rel='stylesheet' id='woo-features-css-css' href='https://innovationatwork.ieee.org/wp-content/themes/canvas/includes/integrations/features/css/features.css?ver=6.6.1' type='text/css' media='all' /> <link rel='stylesheet' id='tablepress-default-css' href='https://innovationatwork.ieee.org/wp-content/plugins/tablepress/css/build/default.css?ver=3.0.1' type='text/css' media='all' /> <link rel='stylesheet' id='addtoany-css' href='https://innovationatwork.ieee.org/wp-content/plugins/add-to-any/addtoany.min.css?ver=1.16' type='text/css' media='all' /> <link rel='stylesheet' id='theme-stylesheet-css' href='https://innovationatwork.ieee.org/wp-content/themes/canvas/style.css?ver=5.11.7' type='text/css' media='all' /> <link rel='stylesheet' id='woo-gravity-forms-css' href='https://innovationatwork.ieee.org/wp-content/themes/canvas/includes/integrations/gravity-forms/css/gravity-forms.css?ver=6.6.1' type='text/css' media='all' /> <!--[if lt IE 9]> <link href="https://innovationatwork.ieee.org/wp-content/themes/canvas/css/non-responsive.css" rel="stylesheet" type="text/css" /> <style type="text/css">.col-full, #wrapper { width: 970px; max-width: 970px; } #inner-wrapper { padding: 0; } body.full-width #header, #nav-container, body.full-width #content, body.full-width #footer-widgets, body.full-width #footer { padding-left: 0; padding-right: 0; } body.fixed-mobile #top, body.fixed-mobile #header-container, body.fixed-mobile #footer-container, body.fixed-mobile #nav-container, body.fixed-mobile #footer-widgets-container { min-width: 970px; padding: 0 1em; } body.full-width #content { width: auto; padding: 0 1em;}</style> <![endif]--> <script type="text/javascript" id="addtoany-core-js-before"> /* <![CDATA[ */ window.a2a_config=window.a2a_config||{};a2a_config.callbacks=[];a2a_config.overlays=[];a2a_config.templates={}; /* ]]> */ </script> <script type="text/javascript" defer src="https://static.addtoany.com/menu/page.js" id="addtoany-core-js"></script> <script type="text/javascript" src="https://innovationatwork.ieee.org/wp-includes/js/jquery/jquery.min.js?ver=3.7.1" id="jquery-core-js"></script> <script type="text/javascript" src="https://innovationatwork.ieee.org/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1" id="jquery-migrate-js"></script> <script type="text/javascript" defer src="https://innovationatwork.ieee.org/wp-content/plugins/add-to-any/addtoany.min.js?ver=1.1" id="addtoany-jquery-js"></script> <script type="text/javascript" src="https://innovationatwork.ieee.org/wp-content/themes/canvas/includes/js/third-party.min.js?ver=6.6.1" id="third-party-js"></script> <script type="text/javascript" src="https://innovationatwork.ieee.org/wp-content/themes/canvas/includes/js/modernizr.min.js?ver=2.6.2" id="modernizr-js"></script> <script type="text/javascript" src="https://innovationatwork.ieee.org/wp-content/themes/canvas/includes/js/general.min.js?ver=6.6.1" id="general-js"></script> <!-- Adjust the website width --> <style type="text/css"> .col-full, #wrapper { max-width: 970px !important; } </style> <link rel="https://api.w.org/" href="https://innovationatwork.ieee.org/wp-json/" /><link rel="alternate" title="JSON" type="application/json" href="https://innovationatwork.ieee.org/wp-json/wp/v2/pages/982" /><link rel="EditURI" type="application/rsd+xml" title="RSD" href="https://innovationatwork.ieee.org/xmlrpc.php?rsd" /> <link rel='shortlink' href='https://innovationatwork.ieee.org/?p=982' /> <link rel="alternate" title="oEmbed (JSON)" type="application/json+oembed" href="https://innovationatwork.ieee.org/wp-json/oembed/1.0/embed?url=https%3A%2F%2Finnovationatwork.ieee.org%2Fcyber-security%2F" /> <link rel="alternate" title="oEmbed (XML)" type="text/xml+oembed" href="https://innovationatwork.ieee.org/wp-json/oembed/1.0/embed?url=https%3A%2F%2Finnovationatwork.ieee.org%2Fcyber-security%2F&#038;format=xml" /> <meta name="tec-api-version" content="v1"><meta name="tec-api-origin" content="https://innovationatwork.ieee.org"><link rel="alternate" href="https://innovationatwork.ieee.org/wp-json/tribe/events/v1/" /> <!-- Custom CSS Styling --> <style type="text/css"> #logo .site-title, #logo .site-description { display:none; } body {background-repeat:repeat;background-position:top left;background-attachment:scroll;border-top:0px solid #000000;} #header {background-image:url(https://innovationatwork.ieee.org/wp-content/uploads/2015/06/cropped-header-background.png);background-repeat:repeat;background-position:left top;margin-top:0px;margin-bottom:0px;padding-top:0px;padding-bottom:0px;border:0px solid ;} #logo {padding-left:0px;}.header-widget {padding-right:0px;} #logo .site-title a {font:bold 40px/1em Arial, sans-serif;color:#222222;} #logo .site-description {font:300 13px/1em Arial, sans-serif;color:#999999;} body, p { font:300 14px/1.5em Arial, sans-serif;color:#000000; } h1 { font:bold 28px/1.2em Arial, sans-serif;color:#222222; }h2 { font:bold 24px/1.2em Arial, sans-serif;color:#222222; }h3 { font:bold 20px/1.2em Arial, sans-serif;color:#222222; }h4 { font:bold 16px/1.2em Arial, sans-serif;color:#222222; }h5 { font:normal 13px/1.2em Arial, sans-serif;color:#222222; }h6 { font:300 14px/1.2em Arial, sans-serif;color:#222222; } .page-title, .post .title, .page .title {font:bold 28px/1.1em Arial, sans-serif;color:#222222;} .post .title a:link, .post .title a:visited, .page .title a:link, .page .title a:visited {color:#222222} .post-meta { font:300 15px/1.5em Arial, sans-serif;color:#cccccc; } .entry, .entry p{ font:300 15px/1.5em Arial, sans-serif;color:#555555; } .post-more {font:300 15px/1.5em Arial, sans-serif;color:;border-top:0px solid #e6e6e6;border-bottom:0px solid #e6e6e6;} #post-author, #connect {border-top:1px solid #e6e6e6;border-bottom:1px solid #e6e6e6;border-left:1px solid #e6e6e6;border-right:1px solid #e6e6e6;border-radius:5px;-moz-border-radius:5px;-webkit-border-radius:5px;background-color:#fafafa} #comments .comment.thread-even {background-color:#ffffff;} .nav-entries a, .woo-pagination { font:300 14px/1em Arial, sans-serif;color:#888; } .woo-pagination a, .woo-pagination a:hover {color:#888!important} .widget h3 {font:bold 14px/1.2em Arial, sans-serif;color:#555555;border-bottom:1px solid #e6e6e6;} .widget_recent_comments li, #twitter li { border-color: #e6e6e6;} .widget p, .widget .textwidget { font:300 13px/1.5em Arial, sans-serif;color:#555555; } .widget {font:300 13px/1.5em Arial, sans-serif;color:#555555;background-color:#ffffff;border-radius:0px;-moz-border-radius:0px;-webkit-border-radius:0px;} #tabs, .widget_woodojo_tabs .tabbable {background-color:#dddddd;} #tabs .inside, #tabs ul.wooTabs li a.selected, #tabs ul.wooTabs li a:hover {background-color:#eeeeee;} #tabs .inside li a, .widget_woodojo_tabs .tabbable .tab-pane li a { font:bold 12px/1.5em Arial, sans-serif;color:#666666; } #tabs .inside li span.meta, .widget_woodojo_tabs .tabbable .tab-pane li span.meta { font:300 11px/1.5em Arial, sans-serif;color:#666666; } #tabs ul.wooTabs li a, .widget_woodojo_tabs .tabbable .nav-tabs li a { font:300 11px/2em Arial, sans-serif;color:#666666; } ul.nav li a, #navigation ul.rss a, #navigation ul.cart a.cart-contents, #navigation .cart-contents #navigation ul.rss, #navigation ul.nav-search, #navigation ul.nav-search a { font:normal 14px/1.2em Arial, sans-serif;color:#ffffff; } #navigation ul.rss li a:before, #navigation ul.nav-search a.search-contents:before { color:#ffffff;} #navigation ul.nav > li a:hover, #navigation ul.nav > li:hover a, #navigation ul.nav li ul li a, #navigation ul.cart > li:hover > a, #navigation ul.cart > li > ul > div, #navigation ul.cart > li > ul > div p, #navigation ul.cart > li > ul span, #navigation ul.cart .cart_list a, #navigation ul.nav li.current_page_item a, #navigation ul.nav li.current_page_parent a, #navigation ul.nav li.current-menu-ancestor a, #navigation ul.nav li.current-cat a, #navigation ul.nav li.current-menu-item a { color:#ffffff!important; } #navigation ul.nav > li a:hover, #navigation ul.nav > li:hover, #navigation ul.nav li ul, #navigation ul.cart li:hover a.cart-contents, #navigation ul.nav-search li:hover a.search-contents, #navigation ul.nav-search a.search-contents + ul, #navigation ul.cart a.cart-contents + ul, #navigation ul.nav li.current_page_item a, #navigation ul.nav li.current_page_parent a, #navigation ul.nav li.current-menu-ancestor a, #navigation ul.nav li.current-cat a, #navigation ul.nav li.current-menu-item a{background-color:#003f77!important} #navigation ul.nav li ul, #navigation ul.cart > li > ul > div { border: 0px solid #dbdbdb; } #navigation ul.nav > li:hover > ul { left: 0; } #navigation ul.nav > li { border-right: 0px solid #ffffff; }#navigation ul.nav > li:hover > ul { left: 0; } #navigation { box-shadow: none; -moz-box-shadow: none; -webkit-box-shadow: none; }#navigation ul li:first-child, #navigation ul li:first-child a { border-radius:0px 0 0 0px; -moz-border-radius:0px 0 0 0px; -webkit-border-radius:0px 0 0 0px; } #navigation {background:#006699;border-top:0px solid #aaaaaa;border-bottom:0px solid #ffffff;border-left:0px solid #dbdbdb;border-right:0px solid #dbdbdb;border-radius:0px; -moz-border-radius:0px; -webkit-border-radius:0px;margin-top:0px;margin-bottom:0px;} #top, #top ul.nav li ul li a:hover { background:#cecece;} #top ul.nav li a { font:normal 12px/1.6em Arial, sans-serif;color:#666666; } #top ul.nav li.parent > a:after { border-top-color:#666666;} #footer, #footer p { font:300 13px/1.4em Arial, sans-serif;color:#000000; } #footer {background-color:#ffffff;border-top:1px solid #dbdbdb;border-bottom:0px solid ;border-left:0px solid ;border-right:0px solid ;border-radius:0px; -moz-border-radius:0px; -webkit-border-radius:0px;} .magazine #loopedSlider .content h2.title a { font:bold 24px/1em Arial, sans-serif;color:#ffffff; } .wooslider-theme-magazine .slide-title a { font:bold 24px/1em Arial, sans-serif;color:#ffffff; } .magazine #loopedSlider .content .excerpt p { font:300 13px/1.5em Arial, sans-serif;color:#cccccc; } .wooslider-theme-magazine .slide-content p, .wooslider-theme-magazine .slide-excerpt p { font:300 13px/1.5em Arial, sans-serif;color:#cccccc; } .magazine .block .post .title a {font:bold 18px/1.2em Arial, sans-serif;color:#222222; } #loopedSlider.business-slider .content h2 { font:bold 24px/1em Arial, sans-serif;color:#ffffff; } #loopedSlider.business-slider .content h2.title a { font:bold 24px/1em Arial, sans-serif;color:#ffffff; } .wooslider-theme-business .has-featured-image .slide-title { font:bold 24px/1em Arial, sans-serif;color:#ffffff; } .wooslider-theme-business .has-featured-image .slide-title a { font:bold 24px/1em Arial, sans-serif;color:#ffffff; } #wrapper #loopedSlider.business-slider .content p { font:normal 16px/1.5em Arial, sans-serif;color:#ffffff; } .wooslider-theme-business .has-featured-image .slide-content p { font:normal 16px/1.5em Arial, sans-serif;color:#ffffff; } .wooslider-theme-business .has-featured-image .slide-excerpt p { font:normal 16px/1.5em Arial, sans-serif;color:#ffffff; } @media only screen and (min-width:768px) { #wrapper #loopedSlider.business-slider .content { width: 40%; top: 2.5em; bottom: inherit; left:0; right: inherit; text-align: left; } } .archive_header { font:bold 18px/1em Arial, sans-serif;color:#222222; } .archive_header {border-bottom:1px solid #e6e6e6;} </style> <style type="text/css" id="woo-header-bg-css"> #header { background-image:url(https://ieeeces.wpengine.com/wp-content/uploads/2015/06/cropped-header-background.png); } </style> <!-- Options Panel Custom CSS --> <style type="text/css"> https://cmp.osano.com/AzyzptTmRlqVd2LRf/1a29d9a8-011b-4815-a090-7f6c6a8e4a02/osano.js #header .header-widget { margin-top: 9px; } </style> <!-- Woo Shortcodes CSS --> <link href="https://innovationatwork.ieee.org/wp-content/themes/canvas/functions/css/shortcodes.css" rel="stylesheet" type="text/css" /> <!-- Custom Stylesheet --> <link href="https://innovationatwork.ieee.org/wp-content/themes/canvas/custom.css" rel="stylesheet" type="text/css" /> <!-- Theme version --> <meta name="generator" content="Canvas 5.11.7" /> <meta name="generator" content="WooFramework 6.2.9" /> <style type="text/css" id="woo-header-css"> .site-title, .site-description { clip: rect(1px 1px 1px 1px); /* IE7 */ clip: rect(1px, 1px, 1px, 1px); position: absolute; } </style> <style type="text/css" id="custom-background-css"> body.custom-background { background-image: url('https://innovationatwork.ieee.org/wp-content/uploads/2018/04/white-box.png'); background-repeat: no-repeat; background-position: top center; background-attachment: fixed; } </style> <style media="all" id="siteorigin-panels-layouts-head">/* Layout 982 */ #pgc-982-0-0 , #pgc-982-1-0 , #pgc-982-2-0 , #pgc-982-3-0 { width:100%;width:calc(100% - ( 0 * 30px ) ) } #pg-982-0 , #pg-982-1 , #pg-982-2 , #pg-982-3 , #pl-982 .so-panel { margin-bottom:30px } #pgc-982-4-0 { width:55.002%;width:calc(55.002% - ( 0.449980197771 * 30px ) ) } #pgc-982-4-1 { width:44.998%;width:calc(44.998% - ( 0.550019802229 * 30px ) ) } #pl-982 .so-panel:last-of-type { margin-bottom:0px } @media (max-width:780px){ #pg-982-0.panel-no-style, #pg-982-0.panel-has-style > .panel-row-style, #pg-982-0 , #pg-982-1.panel-no-style, #pg-982-1.panel-has-style > .panel-row-style, #pg-982-1 , #pg-982-2.panel-no-style, #pg-982-2.panel-has-style > .panel-row-style, #pg-982-2 , #pg-982-3.panel-no-style, #pg-982-3.panel-has-style > .panel-row-style, #pg-982-3 , #pg-982-4.panel-no-style, #pg-982-4.panel-has-style > .panel-row-style, #pg-982-4 { -webkit-flex-direction:column;-ms-flex-direction:column;flex-direction:column } #pg-982-0 > .panel-grid-cell , #pg-982-0 > .panel-row-style > .panel-grid-cell , #pg-982-1 > .panel-grid-cell , #pg-982-1 > .panel-row-style > .panel-grid-cell , #pg-982-2 > .panel-grid-cell , #pg-982-2 > .panel-row-style > .panel-grid-cell , #pg-982-3 > .panel-grid-cell , #pg-982-3 > .panel-row-style > .panel-grid-cell , #pg-982-4 > .panel-grid-cell , #pg-982-4 > .panel-row-style > .panel-grid-cell { width:100%;margin-right:0 } #pgc-982-4-0 { margin-bottom:30px } #pl-982 .panel-grid-cell { padding:0 } #pl-982 .panel-grid .panel-grid-cell-empty { display:none } #pl-982 .panel-grid .panel-grid-cell-mobile-last { margin-bottom:0px } } </style><link rel="icon" href="https://innovationatwork.ieee.org/wp-content/uploads/2016/03/cropped-ieee_apple_favicon_57x57-32x32.png" sizes="32x32" /> <link rel="icon" href="https://innovationatwork.ieee.org/wp-content/uploads/2016/03/cropped-ieee_apple_favicon_57x57-192x192.png" sizes="192x192" /> <link rel="apple-touch-icon" href="https://innovationatwork.ieee.org/wp-content/uploads/2016/03/cropped-ieee_apple_favicon_57x57-180x180.png" /> <meta name="msapplication-TileImage" content="https://innovationatwork.ieee.org/wp-content/uploads/2016/03/cropped-ieee_apple_favicon_57x57-270x270.png" /> <style type="text/css" id="wp-custom-css"> .pt-cv-readmore { color: #ffffff!important; background-color: #428bca !important; border: none !important; } i.fa-x-twitter { display: inline-block; border-radius: 15px; box-shadow: 0 0 2px #888; padding: 8px; background: #009fdd; font-size: 15px; color: #fff; height: 15px; } body .gform_wrapper input[type='radio'], body .gform_wrapper input[type='checkbox'] { width: inherit!important; } </style> <script src="//app-ab24.marketo.com/js/forms2/js/forms2.min.js"></script> <script src="https://s3.amazonaws.com/ieee-mkto-cross-domain/enterprise-page-code.js"></script> <script type="text/javascript" src="https://cdns.gigya.com/js/gigya.js?apikey=3_ihC9k-currG51rxnDiN6bhiAzQy1-4zw1zOtNOrZ11jAxUhFRKPUrVKs553Kv7px "></script> </head> <body class="page-template-default page page-id-982 custom-background siteorigin-panels siteorigin-panels-before-js tribe-no-js page-template-canvas ie7 ie alt-style-default two-col-left width-970 two-col-left-970"> <div id="top"> <div class="col-full"> <h3 class="top-menu">Metanav</h3><ul id="top-nav" class="nav top-navigation fl"><li id="menu-item-20" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-20"><a href="http://www.ieee.org">IEEE.org</a></li> <li id="menu-item-397" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-397"><a href="http://ieeexplore.ieee.org/Xplore/home.jsp">IEEE <i>Xplore</i> Digital Library</a></li> <li id="menu-item-398" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-398"><a href="http://standards.ieee.org/">IEEE Standards</a></li> <li id="menu-item-399" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-399"><a href="http://spectrum.ieee.org/">IEEE Spectrum</a></li> <li id="menu-item-400" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-400"><a href="http://www.ieee.org/sitemap.html">More Sites</a></li> </ul> </div> </div><!-- /#top --> <div id="wrapper"> <div id="inner-wrapper"> <!-- v ieee cookie banner v --> <script src="https://cmp.osano.com/AzyzptTmRlqVd2LRf/1a29d9a8-011b-4815-a090-7f6c6a8e4a02/osano.js"></script> <link rel="stylesheet" href="https://cookie-consent.ieee.org/ieee-cookie-banner.css" type="text/css"/> <!-- ^ ieee cookie banner ^ --><h3 class="nav-toggle icon"><a href="#navigation">Navigation</a></h3> <header id="header" class="col-full"> <div id="logo"> <a href="https://innovationatwork.ieee.org/" title="Preparing your organization for emerging technologies"><img src="https://innovationatwork.ieee.org/wp-content/uploads/2017/04/IEEE-Innovation-at-Work_Type-Treatment_Final-300x72.jpg" alt="IEEE Innovation at Work" /></a> <span class="site-title"><a href="https://innovationatwork.ieee.org/">IEEE Innovation at Work</a></span> <span class="site-description">Preparing your organization for emerging technologies</span> </div> <div class="header-widget"> <div id="sow-image-2" class="widget widget_sow-image"><div class="so-widget-sow-image so-widget-sow-image-default-e4c2d9f6c920" > <div class="sow-image-container"> <a href="http://www.ieee.org/index.html" > <img src="https://innovationatwork.ieee.org/wp-content/uploads/2015/06/black-transparent.png" width="150" height="53" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2015/06/black-transparent.png 1917w, https://innovationatwork.ieee.org/wp-content/uploads/2015/06/black-transparent-300x107.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2015/06/black-transparent-1024x365.png 1024w" sizes="(max-width: 150px) 100vw, 150px" title="IEEE" alt="IEEE" decoding="async" class="so-widget-image"/> </a></div> </div></div> </div> <script src="https://kit.fontawesome.com/ec2aa9536a.js" crossorigin="anonymous"></script> </header> <nav id="navigation" class="col-full" role="navigation"> <section class="menus nav-icons nav-icons-1"> <a href="https://innovationatwork.ieee.org" class="nav-home"><span>Home</span></a> <h3>Nav Bar</h3><ul id="main-nav" class="nav fl"><li id="menu-item-977" class="menu-item menu-item-type-post_type menu-item-object-page current-menu-ancestor current-menu-parent current_page_parent current_page_ancestor menu-item-has-children menu-item-977"><a href="https://innovationatwork.ieee.org/articles/">Articles</a> <ul class="sub-menu"> <li id="menu-item-1476" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-1476"><a href="https://innovationatwork.ieee.org/artificial-intelligence-resources/">Artificial Intelligence</a></li> <li id="menu-item-1990" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-1990"><a href="https://innovationatwork.ieee.org/autonomous-vehicles-resources/">Autonomous Vehicles</a></li> <li id="menu-item-1988" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-1988"><a href="https://innovationatwork.ieee.org/blockchain-resources/">Blockchain</a></li> <li id="menu-item-987" class="menu-item menu-item-type-post_type menu-item-object-page current-menu-item page_item page-item-982 current_page_item menu-item-987"><a href="https://innovationatwork.ieee.org/cyber-security/" aria-current="page">Cyber Security</a></li> <li id="menu-item-1987" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-1987"><a href="https://innovationatwork.ieee.org/edge_computing/">Edge Computing</a></li> <li id="menu-item-986" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-986"><a href="https://innovationatwork.ieee.org/ethical-hacking/">Ethical Hacking</a></li> <li id="menu-item-1986" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-1986"><a href="https://innovationatwork.ieee.org/grid-modernization-resources/">Grid Modernization</a></li> <li id="menu-item-985" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-985"><a href="https://innovationatwork.ieee.org/internet-of-things/">Internet of Things</a></li> </ul> </li> <li id="menu-item-1002" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-1002"><a href="https://innovationatwork.ieee.org/courses/">Courses</a></li> <li id="menu-item-3455" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-3455"><a href="https://innovationatwork.ieee.org/events/virtual-events/">Virtual Events</a></li> <li id="menu-item-978" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-978"><a href="https://innovationatwork.ieee.org/contact-us/">Contact Us</a></li> </ul><aside id="connect" style="border:none; float:right;background:none;padding:0 82px 0 0;margin: -37px 0 0 0"> <div class="social" style="border:none;background:none;"> <a target="_blank" href="https://www.facebook.com/ieee.continuing.education/" class="facebook" title="Facebook"></a> <a target="_blank" href="https://twitter.com/IEEElearn" title="Twitter"><i class="fa-brands fa-x-twitter"></i></a> <a target="_blank" href="https://www.linkedin.com/company/ieee-educational-activities" class="linkedin" title="LinkedIn"></a> </div> <div class="fix"></div> </aside> <div class="side-nav"> <ul class="nav-search"> <li> <a class="search-contents" href="#"></a> <ul> <li> <div class="widget widget_search"><div class="search_main"> <form method="get" class="searchform" action="https://innovationatwork.ieee.org/" > <input type="text" class="field s" name="s" value="Search..." onfocus="if (this.value == 'Search...') {this.value = '';}" onblur="if (this.value == '') {this.value = 'Search...';}" /> <button type="submit" class="fa fa-search submit" name="submit" value="Search"></button> </form> <div class="fix"></div> </div></div> </li> </ul> </li> </ul> </div><!-- /#side-nav --> </section><!-- /.menus --> <a href="#top" class="nav-close"><span>Return to Content</span></a> </nav> <!-- #content Starts --> <div id="content" class="col-full"> <div id="main-sidebar-container"> <!-- #main Starts --> <section id="main"> <article class="post-982 page type-page status-publish hentry"> <header> <h1 class="title entry-title">Cyber Security Resources</h1> </header> <section class="entry"> <div id="pl-982" class="panel-layout" ><div id="pg-982-0" class="panel-grid panel-no-style" ><div id="pgc-982-0-0" class="panel-grid-cell" ><div id="panel-982-0-0-0" class="so-panel widget_sow-image panel-first-child panel-last-child" data-index="0" ><div class="so-widget-sow-image so-widget-sow-image-default-8b5b6f678277-982" > <h3 class="widget-title"></h3> <div class="sow-image-container"> <img fetchpriority="high" decoding="async" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/03/Cybersecurity-banner-900x300.jpg" width="900" height="250" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/03/Cybersecurity-banner-900x300.jpg 900w, https://innovationatwork.ieee.org/wp-content/uploads/2017/03/Cybersecurity-banner-900x300-300x83.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2017/03/Cybersecurity-banner-900x300-768x213.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/03/Cybersecurity-banner-900x300-150x42.jpg 150w" sizes="(max-width: 900px) 100vw, 900px" alt="IEEE Continuing Education: Cyber Security" class="so-widget-image"/> </div> </div></div></div></div><div id="pg-982-1" class="panel-grid panel-no-style" ><div id="pgc-982-1-0" class="panel-grid-cell" ><div id="panel-982-1-0-0" class="so-panel widget_sow-editor panel-first-child panel-last-child" data-index="1" ><div class="so-widget-sow-editor so-widget-sow-editor-base" ><h3 class="widget-title">Overview</h3> <div class="siteorigin-widget-tinymce textwidget"> <p>Cyber attacks cost organizations millions each year. Hackers are becoming more sophisticated by the day, and there just aren't enough engineers trained in cyber security to meet market demand. Today's network security engineer needs to become familiar with topics like cryptography, network sniffing, footprinting, penetration testing, cloud security, web server and web application security, Wi-Fi and Bluetooth security, and mobile device security. Discover cyber security resources to help you become familiar with this growing field.</p> <p>Ready for more? IEEE Continuing Education training equips network engineers in all these areas. <a href="http://bit.ly/2oivvrQ">Learn more</a>.</p> </div> </div></div></div></div><div id="pg-982-2" class="panel-grid panel-no-style" ><div id="pgc-982-2-0" class="panel-grid-cell" ><div id="panel-982-2-0-0" class="so-panel widget_sow-editor panel-first-child panel-last-child" data-index="2" ><div class="so-widget-sow-editor so-widget-sow-editor-base" ><h3 class="widget-title">Cyber Security Resources</h3> <div class="siteorigin-widget-tinymce textwidget"> <div class="pt-cv-wrapper"> <div class="pt-cv-view pt-cv-grid pt-cv-colsys" id="pt-cv-view-c36b902kj0"> <div data-id="pt-cv-page-1" class="pt-cv-page" data-cvc="2"> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/upskilling-in-a-rapidly-changing-world-technical-training-at-your-fingertips/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img decoding="async" width="300" height="201" src="https://innovationatwork.ieee.org/wp-content/uploads/2024/10/eLL-header-image-300x201.png" class="pt-cv-thumbnail" alt="workforce-development-elearning-library" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2024/10/eLL-header-image-300x201.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2024/10/eLL-header-image-768x514.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2024/10/eLL-header-image-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2024/10/eLL-header-image-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2024/10/eLL-header-image.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/upskilling-in-a-rapidly-changing-world-technical-training-at-your-fingertips/" class="_self" target="_self" >Upskilling in a Rapidly Changing World: Technical Training at Your Fingertips</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/october-is-cybersecurity-awareness-month-boost-your-cyber-defenses/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2024/10/bigstock-Almost-All-Security-Systems-Ar-473312471_1024X684-300x200.png" class="pt-cv-thumbnail" alt="" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2024/10/bigstock-Almost-All-Security-Systems-Ar-473312471_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2024/10/bigstock-Almost-All-Security-Systems-Ar-473312471_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2024/10/bigstock-Almost-All-Security-Systems-Ar-473312471_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2024/10/bigstock-Almost-All-Security-Systems-Ar-473312471_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2024/10/bigstock-Almost-All-Security-Systems-Ar-473312471_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/october-is-cybersecurity-awareness-month-boost-your-cyber-defenses/" class="_self" target="_self" >October Is Cybersecurity Awareness Month–Boost Your Cyber Defenses</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/ten-steps-to-shore-up-your-organizations-digital-fortress/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2023/12/bigstock-222338758-iot_1024X684-300x200.png" class="pt-cv-thumbnail" alt="iot-cyber-threats" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2023/12/bigstock-222338758-iot_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2023/12/bigstock-222338758-iot_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2023/12/bigstock-222338758-iot_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2023/12/bigstock-222338758-iot_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2023/12/bigstock-222338758-iot_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/ten-steps-to-shore-up-your-organizations-digital-fortress/" class="_self" target="_self" >Take Steps to Shore Up Your Organization&#8217;s Digital Fortress</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/digital-privacy-and-protecting-your-information-in-the-cyber-age/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2023/12/bigstock-137923742_1024X684-300x200.png" class="pt-cv-thumbnail" alt="digital-privacy" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2023/12/bigstock-137923742_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2023/12/bigstock-137923742_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2023/12/bigstock-137923742_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2023/12/bigstock-137923742_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2023/12/bigstock-137923742_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/digital-privacy-and-protecting-your-information-in-the-cyber-age/" class="_self" target="_self" >Digital Privacy and Protecting Your Information in the Cyber Age</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/mind-your-customer-data-the-need-for-data-privacy-engineering/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2023/10/Mind-Your-Customer-Data-1-300x200.png" class="pt-cv-thumbnail" alt="mind-your-customer-data" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2023/10/Mind-Your-Customer-Data-1-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2023/10/Mind-Your-Customer-Data-1-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2023/10/Mind-Your-Customer-Data-1-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2023/10/Mind-Your-Customer-Data-1-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2023/10/Mind-Your-Customer-Data-1.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/mind-your-customer-data-the-need-for-data-privacy-engineering/" class="_self" target="_self" >Mind Your Customer Data: The Need for Data Privacy Engineering</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/the-importance-of-iot-security-in-a-connected-world/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2023/10/bigstock-Internet-Of-Things-Iot-And-Cl-477903777_1024X684-300x200.png" class="pt-cv-thumbnail" alt="importance-of-iot-security-for-connected-devices" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2023/10/bigstock-Internet-Of-Things-Iot-And-Cl-477903777_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2023/10/bigstock-Internet-Of-Things-Iot-And-Cl-477903777_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2023/10/bigstock-Internet-Of-Things-Iot-And-Cl-477903777_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2023/10/bigstock-Internet-Of-Things-Iot-And-Cl-477903777_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2023/10/bigstock-Internet-Of-Things-Iot-And-Cl-477903777_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/the-importance-of-iot-security-in-a-connected-world/" class="_self" target="_self" >The Importance of IoT Security in a Connected World</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/safeguard-your-organization-from-cyber-attacks/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2023/10/bigstock-Network-Security-Business-Usi-475191619_1024X684-300x200.png" class="pt-cv-thumbnail" alt="threat-of-cyber-attacks" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2023/10/bigstock-Network-Security-Business-Usi-475191619_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2023/10/bigstock-Network-Security-Business-Usi-475191619_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2023/10/bigstock-Network-Security-Business-Usi-475191619_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2023/10/bigstock-Network-Security-Business-Usi-475191619_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2023/10/bigstock-Network-Security-Business-Usi-475191619_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/safeguard-your-organization-from-cyber-attacks/" class="_self" target="_self" >Safeguard Your Organization from Cyber Attacks</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/data-privacy-is-everybodys-business-building-data-privacy-principles-into-product-development/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2023/05/bigstock-Cyber-Security-And-Data-Protec-470642625_1024X684-300x200.png" class="pt-cv-thumbnail" alt="data-privacy-principles" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2023/05/bigstock-Cyber-Security-And-Data-Protec-470642625_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2023/05/bigstock-Cyber-Security-And-Data-Protec-470642625_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2023/05/bigstock-Cyber-Security-And-Data-Protec-470642625_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2023/05/bigstock-Cyber-Security-And-Data-Protec-470642625_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2023/05/bigstock-Cyber-Security-And-Data-Protec-470642625_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/data-privacy-is-everybodys-business-building-data-privacy-principles-into-product-development/" class="_self" target="_self" >Data Privacy is Everybody’s Business: Building Data Privacy Principles into Product Development</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/cyber-security-tips-for-protecting-digital-privacy/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2023/01/bigstock-Black-Businesswoman-Take-Note-462129987_1024X684-300x200.png" class="pt-cv-thumbnail" alt="protecting-digital-privacy-tips" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2023/01/bigstock-Black-Businesswoman-Take-Note-462129987_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2023/01/bigstock-Black-Businesswoman-Take-Note-462129987_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2023/01/bigstock-Black-Businesswoman-Take-Note-462129987_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2023/01/bigstock-Black-Businesswoman-Take-Note-462129987_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2023/01/bigstock-Black-Businesswoman-Take-Note-462129987_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/cyber-security-tips-for-protecting-digital-privacy/" class="_self" target="_self" >Cyber Security Tips for Protecting Digital Privacy</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/top-technology-trends-for-2023/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2023/01/bigstock-New-Year-Concept-With-Tec-465446703_1024X684-300x200.png" class="pt-cv-thumbnail" alt="" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2023/01/bigstock-New-Year-Concept-With-Tec-465446703_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2023/01/bigstock-New-Year-Concept-With-Tec-465446703_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2023/01/bigstock-New-Year-Concept-With-Tec-465446703_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2023/01/bigstock-New-Year-Concept-With-Tec-465446703_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2023/01/bigstock-New-Year-Concept-With-Tec-465446703_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/top-technology-trends-for-2023/" class="_self" target="_self" >Top Technology Trends for 2023</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/digital-transformation-the-future-of-business-is-gaining-traction/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2022/09/bigstock-Business-Visual-Data-Analyzing-429125213_1024X684-300x200.png" class="pt-cv-thumbnail" alt="digital-transformation-strategy" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2022/09/bigstock-Business-Visual-Data-Analyzing-429125213_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2022/09/bigstock-Business-Visual-Data-Analyzing-429125213_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2022/09/bigstock-Business-Visual-Data-Analyzing-429125213_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2022/09/bigstock-Business-Visual-Data-Analyzing-429125213_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2022/09/bigstock-Business-Visual-Data-Analyzing-429125213_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/digital-transformation-the-future-of-business-is-gaining-traction/" class="_self" target="_self" >Digital Transformation: The Future of Business is Gaining Traction</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/the-continuing-evolution-of-automotive-cyber-security/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2022/08/bigstock-Intelligent-Car-App-On-Smart-P-361685485_1024X684-300x200.png" class="pt-cv-thumbnail" alt="automotive-cyber-security-evolution" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2022/08/bigstock-Intelligent-Car-App-On-Smart-P-361685485_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2022/08/bigstock-Intelligent-Car-App-On-Smart-P-361685485_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2022/08/bigstock-Intelligent-Car-App-On-Smart-P-361685485_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2022/08/bigstock-Intelligent-Car-App-On-Smart-P-361685485_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2022/08/bigstock-Intelligent-Car-App-On-Smart-P-361685485_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/the-continuing-evolution-of-automotive-cyber-security/" class="_self" target="_self" >The Continuing Evolution of Automotive Cyber Security</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/ai-enabled-commercial-farming-equipment-requires-enhanced-cyber-security/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2022/06/bigstock-Aerial-Drone-View-Combine-Har-374930662_1024X684-300x200.png" class="pt-cv-thumbnail" alt="ai-enabled-commercial-farm-equipment" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2022/06/bigstock-Aerial-Drone-View-Combine-Har-374930662_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2022/06/bigstock-Aerial-Drone-View-Combine-Har-374930662_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2022/06/bigstock-Aerial-Drone-View-Combine-Har-374930662_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2022/06/bigstock-Aerial-Drone-View-Combine-Har-374930662_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2022/06/bigstock-Aerial-Drone-View-Combine-Har-374930662_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/ai-enabled-commercial-farming-equipment-requires-enhanced-cyber-security/" class="_self" target="_self" >AI-Enabled Commercial Farming Equipment Requires Enhanced Cyber Security</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/ethical-hacking-is-essential-to-fighting-cyber-crime/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2022/06/bigstock-Certified-Ethical-Hacker-Ceh-416158993_1024X684-300x200.png" class="pt-cv-thumbnail" alt="cyber-crime" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2022/06/bigstock-Certified-Ethical-Hacker-Ceh-416158993_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2022/06/bigstock-Certified-Ethical-Hacker-Ceh-416158993_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2022/06/bigstock-Certified-Ethical-Hacker-Ceh-416158993_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2022/06/bigstock-Certified-Ethical-Hacker-Ceh-416158993_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2022/06/bigstock-Certified-Ethical-Hacker-Ceh-416158993_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/ethical-hacking-is-essential-to-fighting-cyber-crime/" class="_self" target="_self" >Ethical Hacking is Essential to Fighting Cyber Crime</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/personal-data-produced-by-iot-devices/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2022/04/bigstock-Smart-Home-Voice-Control-Smar-437591792_1024X684-300x200.png" class="pt-cv-thumbnail" alt="personal-data-produced-by-iot-devices" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2022/04/bigstock-Smart-Home-Voice-Control-Smar-437591792_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2022/04/bigstock-Smart-Home-Voice-Control-Smar-437591792_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2022/04/bigstock-Smart-Home-Voice-Control-Smar-437591792_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2022/04/bigstock-Smart-Home-Voice-Control-Smar-437591792_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2022/04/bigstock-Smart-Home-Voice-Control-Smar-437591792_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/personal-data-produced-by-iot-devices/" class="_self" target="_self" >Personal Data Produced By IoT Devices</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/four-steps-to-implementing-a-successful-data-privacy-program/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2022/03/bigstock-Cyber-Security-And-Digital-Dat-308163841_1024X684-300x200.png" class="pt-cv-thumbnail" alt="successful-data-privacy-program" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2022/03/bigstock-Cyber-Security-And-Digital-Dat-308163841_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2022/03/bigstock-Cyber-Security-And-Digital-Dat-308163841_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2022/03/bigstock-Cyber-Security-And-Digital-Dat-308163841_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2022/03/bigstock-Cyber-Security-And-Digital-Dat-308163841_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2022/03/bigstock-Cyber-Security-And-Digital-Dat-308163841_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/four-steps-to-implementing-a-successful-data-privacy-program/" class="_self" target="_self" >Four Steps To Implementing A Successful Data Privacy Program</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/how-blockchain-will-revolutionize-cyber-security/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2022/03/bigstock-Blockchain-Security-Digital-Te-403303529_1024X684-300x200.jpg" class="pt-cv-thumbnail" alt="decentralized-identity-blockchain-cyber-security" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2022/03/bigstock-Blockchain-Security-Digital-Te-403303529_1024X684-300x200.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2022/03/bigstock-Blockchain-Security-Digital-Te-403303529_1024X684-768x513.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2022/03/bigstock-Blockchain-Security-Digital-Te-403303529_1024X684-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2022/03/bigstock-Blockchain-Security-Digital-Te-403303529_1024X684-272x182.jpg 272w, https://innovationatwork.ieee.org/wp-content/uploads/2022/03/bigstock-Blockchain-Security-Digital-Te-403303529_1024X684.jpg 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/how-blockchain-will-revolutionize-cyber-security/" class="_self" target="_self" >How Blockchain Will Revolutionize Cyber Security</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/rethinking-your-data-privacy-practices-consider-these-three-rules/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2022/03/bigstock-Cyber-Security-And-Alteration-447633241_1024X684-300x200.png" class="pt-cv-thumbnail" alt="data-privacy-practices" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2022/03/bigstock-Cyber-Security-And-Alteration-447633241_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2022/03/bigstock-Cyber-Security-And-Alteration-447633241_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2022/03/bigstock-Cyber-Security-And-Alteration-447633241_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2022/03/bigstock-Cyber-Security-And-Alteration-447633241_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2022/03/bigstock-Cyber-Security-And-Alteration-447633241_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/rethinking-your-data-privacy-practices-consider-these-three-rules/" class="_self" target="_self" >Rethinking Your Data Privacy Practices? Consider These Three Rules</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/more-organizations-slapped-with-big-fines-under-new-privacy-laws/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2022/02/bigstock-Lock-Icon-And-Shield-Icon-On-T-441351353_1024X648-300x200.png" class="pt-cv-thumbnail" alt="" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2022/02/bigstock-Lock-Icon-And-Shield-Icon-On-T-441351353_1024X648-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2022/02/bigstock-Lock-Icon-And-Shield-Icon-On-T-441351353_1024X648-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2022/02/bigstock-Lock-Icon-And-Shield-Icon-On-T-441351353_1024X648-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2022/02/bigstock-Lock-Icon-And-Shield-Icon-On-T-441351353_1024X648-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2022/02/bigstock-Lock-Icon-And-Shield-Icon-On-T-441351353_1024X648.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/more-organizations-slapped-with-big-fines-under-new-privacy-laws/" class="_self" target="_self" >More Organizations Slapped With Big Fines Under New Privacy Laws</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/how-will-data-privacy-impact-organizations-in-2022/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2022/02/bigstock-Data-Protection-Laws-Concept-399230453_1024X684-300x200.png" class="pt-cv-thumbnail" alt="data-privacy-in-2022" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2022/02/bigstock-Data-Protection-Laws-Concept-399230453_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2022/02/bigstock-Data-Protection-Laws-Concept-399230453_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2022/02/bigstock-Data-Protection-Laws-Concept-399230453_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2022/02/bigstock-Data-Protection-Laws-Concept-399230453_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2022/02/bigstock-Data-Protection-Laws-Concept-399230453_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/how-will-data-privacy-impact-organizations-in-2022/" class="_self" target="_self" >How Will Data Privacy Impact Organizations in 2022?</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/three-major-leadership-perception-gaps-hindering-cyber-security/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2022/02/bigstock-Businessman-Wearing-Formal-Sui-445921097_1024X684-300x200.png" class="pt-cv-thumbnail" alt="hindering-cyber-security" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2022/02/bigstock-Businessman-Wearing-Formal-Sui-445921097_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2022/02/bigstock-Businessman-Wearing-Formal-Sui-445921097_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2022/02/bigstock-Businessman-Wearing-Formal-Sui-445921097_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2022/02/bigstock-Businessman-Wearing-Formal-Sui-445921097_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2022/02/bigstock-Businessman-Wearing-Formal-Sui-445921097_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/three-major-leadership-perception-gaps-hindering-cyber-security/" class="_self" target="_self" >Three Major Leadership “Perception Gaps” Hindering Cyber Security </a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/four-ways-to-ensure-your-digital-transformations-success-in-the-new-year/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2022/01/bigstock-Digital-Marketing-Or-Digital-T-438086909_1024X684-300x200.png" class="pt-cv-thumbnail" alt="ensure-your-digital-transformation-is-successful" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2022/01/bigstock-Digital-Marketing-Or-Digital-T-438086909_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2022/01/bigstock-Digital-Marketing-Or-Digital-T-438086909_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2022/01/bigstock-Digital-Marketing-Or-Digital-T-438086909_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2022/01/bigstock-Digital-Marketing-Or-Digital-T-438086909_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2022/01/bigstock-Digital-Marketing-Or-Digital-T-438086909_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/four-ways-to-ensure-your-digital-transformations-success-in-the-new-year/" class="_self" target="_self" >Four Ways to Ensure Your Digital Transformation’s Success in the New Year</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/how-does-chinas-new-data-privacy-law-compare-with-the-eus-gdpr/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2022/01/bigstock-Businesman-Hand-Using-Computer-438068792_1024X684-300x200.png" class="pt-cv-thumbnail" alt="china&#039;s-new-data-privacy-law" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2022/01/bigstock-Businesman-Hand-Using-Computer-438068792_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2022/01/bigstock-Businesman-Hand-Using-Computer-438068792_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2022/01/bigstock-Businesman-Hand-Using-Computer-438068792_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2022/01/bigstock-Businesman-Hand-Using-Computer-438068792_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2022/01/bigstock-Businesman-Hand-Using-Computer-438068792_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/how-does-chinas-new-data-privacy-law-compare-with-the-eus-gdpr/" class="_self" target="_self" >How Does China’s New Data Privacy Law Compare with the EU’s GDPR?</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/innovation-at-works-top-five-reads-from-2021/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2022/01/bigstock-Concepts-Of-A-Promising-New-431014919_1024x684-300x200.png" class="pt-cv-thumbnail" alt="top-reads-from-2021" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2022/01/bigstock-Concepts-Of-A-Promising-New-431014919_1024x684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2022/01/bigstock-Concepts-Of-A-Promising-New-431014919_1024x684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2022/01/bigstock-Concepts-Of-A-Promising-New-431014919_1024x684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2022/01/bigstock-Concepts-Of-A-Promising-New-431014919_1024x684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2022/01/bigstock-Concepts-Of-A-Promising-New-431014919_1024x684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/innovation-at-works-top-five-reads-from-2021/" class="_self" target="_self" >Innovation At Work’s Top Five Reads from 2021</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/four-cyber-security-resolutions-to-adopt-in-the-new-year/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2021/12/bigstock-Internet-Cybersecurity-Concept-428258339_1024X684-blue-300x200.png" class="pt-cv-thumbnail" alt="cyber-security-resolutions" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2021/12/bigstock-Internet-Cybersecurity-Concept-428258339_1024X684-blue-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2021/12/bigstock-Internet-Cybersecurity-Concept-428258339_1024X684-blue-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2021/12/bigstock-Internet-Cybersecurity-Concept-428258339_1024X684-blue-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2021/12/bigstock-Internet-Cybersecurity-Concept-428258339_1024X684-blue-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2021/12/bigstock-Internet-Cybersecurity-Concept-428258339_1024X684-blue.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/four-cyber-security-resolutions-to-adopt-in-the-new-year/" class="_self" target="_self" >Four Cyber Security Resolutions to Adopt in the New Year</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/what-to-know-about-chinas-new-data-privacy-laws/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2021/12/bigstock-143090921_1024X684-300x200.png" class="pt-cv-thumbnail" alt="" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2021/12/bigstock-143090921_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2021/12/bigstock-143090921_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2021/12/bigstock-143090921_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2021/12/bigstock-143090921_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2021/12/bigstock-143090921_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/what-to-know-about-chinas-new-data-privacy-laws/" class="_self" target="_self" >What To Know About China’s New Data Privacy Laws</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/hackers-intensify-attacks-on-tech-companies-and-universities/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2021/11/bigstock-Cyber-Security-Internet-Threa-424866794_1024X684-300x200.png" class="pt-cv-thumbnail" alt="hackers-intensify-attacks" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2021/11/bigstock-Cyber-Security-Internet-Threa-424866794_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2021/11/bigstock-Cyber-Security-Internet-Threa-424866794_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2021/11/bigstock-Cyber-Security-Internet-Threa-424866794_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2021/11/bigstock-Cyber-Security-Internet-Threa-424866794_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2021/11/bigstock-Cyber-Security-Internet-Threa-424866794_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/hackers-intensify-attacks-on-tech-companies-and-universities/" class="_self" target="_self" >Hackers Intensify Attacks On Tech Companies and Universities  </a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/new-rule-could-block-us-access-to-european-data/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2021/10/bigstock-Concept-Of-Cyber-Security-Inf-415697575-300x200.jpg" class="pt-cv-thumbnail" alt="" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2021/10/bigstock-Concept-Of-Cyber-Security-Inf-415697575-300x200.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2021/10/bigstock-Concept-Of-Cyber-Security-Inf-415697575-1024x683.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2021/10/bigstock-Concept-Of-Cyber-Security-Inf-415697575-768x512.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2021/10/bigstock-Concept-Of-Cyber-Security-Inf-415697575-1536x1024.jpg 1536w, https://innovationatwork.ieee.org/wp-content/uploads/2021/10/bigstock-Concept-Of-Cyber-Security-Inf-415697575-2048x1366.jpg 2048w, https://innovationatwork.ieee.org/wp-content/uploads/2021/10/bigstock-Concept-Of-Cyber-Security-Inf-415697575-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2021/10/bigstock-Concept-Of-Cyber-Security-Inf-415697575-272x182.jpg 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/new-rule-could-block-us-access-to-european-data/" class="_self" target="_self" >New Rule Could Block US Access to European Data</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/three-ways-automakers-can-shield-vehicles-from-growing-ransomware-attacks/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2021/09/bigstock-Automation-And-Transport-Conce-326292595_1024X684-300x200.png" class="pt-cv-thumbnail" alt="automotive-data-security" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2021/09/bigstock-Automation-And-Transport-Conce-326292595_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2021/09/bigstock-Automation-And-Transport-Conce-326292595_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2021/09/bigstock-Automation-And-Transport-Conce-326292595_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2021/09/bigstock-Automation-And-Transport-Conce-326292595_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2021/09/bigstock-Automation-And-Transport-Conce-326292595_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/three-ways-automakers-can-shield-vehicles-from-growing-ransomware-attacks/" class="_self" target="_self" >Three Ways Automakers Can Shield Vehicles From Growing Ransomware Attacks</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/data-privacy-law-preparation-four-basic-requirements/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2021/09/bigstock-Cybersecurity-And-Privacy-Conc-434194568_1024X684-300x200.png" class="pt-cv-thumbnail" alt="data-law-privacy" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2021/09/bigstock-Cybersecurity-And-Privacy-Conc-434194568_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2021/09/bigstock-Cybersecurity-And-Privacy-Conc-434194568_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2021/09/bigstock-Cybersecurity-And-Privacy-Conc-434194568_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2021/09/bigstock-Cybersecurity-And-Privacy-Conc-434194568_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2021/09/bigstock-Cybersecurity-And-Privacy-Conc-434194568_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/data-privacy-law-preparation-four-basic-requirements/" class="_self" target="_self" >Data Privacy Law Preparation: Four Basic Requirements</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/five-ways-to-reduce-ransomware-attacks/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2021/08/bigstock-Panning-view-of-a-cyber-securi-430645946_1024X684-300x200.png" class="pt-cv-thumbnail" alt="" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2021/08/bigstock-Panning-view-of-a-cyber-securi-430645946_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2021/08/bigstock-Panning-view-of-a-cyber-securi-430645946_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2021/08/bigstock-Panning-view-of-a-cyber-securi-430645946_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2021/08/bigstock-Panning-view-of-a-cyber-securi-430645946_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2021/08/bigstock-Panning-view-of-a-cyber-securi-430645946_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/five-ways-to-reduce-ransomware-attacks/" class="_self" target="_self" >Five Ways to Reduce Ransomware Attacks</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/new-cyber-security-standard-will-propel-cultural-shift-in-automotive-industry/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2021/08/bigstock-Sports-Car-Concept-Made-In-d-310927108_1024X684-300x200.png" class="pt-cv-thumbnail" alt="cyber-security-standard" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2021/08/bigstock-Sports-Car-Concept-Made-In-d-310927108_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2021/08/bigstock-Sports-Car-Concept-Made-In-d-310927108_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2021/08/bigstock-Sports-Car-Concept-Made-In-d-310927108_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2021/08/bigstock-Sports-Car-Concept-Made-In-d-310927108_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2021/08/bigstock-Sports-Car-Concept-Made-In-d-310927108_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/new-cyber-security-standard-will-propel-cultural-shift-in-automotive-industry/" class="_self" target="_self" >New Cyber Security Standard Will Propel Cultural Shift in Automotive Industry</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/ibm-report-cost-of-data-breaches-soars-to-all-time-high-during-pandemic/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2021/08/bigstock-Simple-Vector-Illustration-Of-409630081_1024X684-300x200.png" class="pt-cv-thumbnail" alt="" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2021/08/bigstock-Simple-Vector-Illustration-Of-409630081_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2021/08/bigstock-Simple-Vector-Illustration-Of-409630081_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2021/08/bigstock-Simple-Vector-Illustration-Of-409630081_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2021/08/bigstock-Simple-Vector-Illustration-Of-409630081_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2021/08/bigstock-Simple-Vector-Illustration-Of-409630081_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/ibm-report-cost-of-data-breaches-soars-to-all-time-high-during-pandemic/" class="_self" target="_self" >IBM Report: Cost of Data Breaches Soars to All-Time High During Pandemic</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/four-strategies-for-protecting-software-defined-vehicles-against-cyber-attacks/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2021/07/bigstock-Intelligent-Car-App-On-Smart-P-402682895_1024X684-300x200.png" class="pt-cv-thumbnail" alt="software-defined-vehicles-cyber-attacks" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2021/07/bigstock-Intelligent-Car-App-On-Smart-P-402682895_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2021/07/bigstock-Intelligent-Car-App-On-Smart-P-402682895_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2021/07/bigstock-Intelligent-Car-App-On-Smart-P-402682895_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2021/07/bigstock-Intelligent-Car-App-On-Smart-P-402682895_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2021/07/bigstock-Intelligent-Car-App-On-Smart-P-402682895_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/four-strategies-for-protecting-software-defined-vehicles-against-cyber-attacks/" class="_self" target="_self" >Four Strategies for Protecting Software-Defined Vehicles Against Cyber Attacks</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/cyber-security-requirements-on-the-horizon-as-ransomware-surges/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2021/06/bigstock-Closed-Padlock-On-Digital-Back-392379260_1024X684-300x200.png" class="pt-cv-thumbnail" alt="ransomware-surges" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2021/06/bigstock-Closed-Padlock-On-Digital-Back-392379260_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2021/06/bigstock-Closed-Padlock-On-Digital-Back-392379260_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2021/06/bigstock-Closed-Padlock-On-Digital-Back-392379260_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2021/06/bigstock-Closed-Padlock-On-Digital-Back-392379260_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2021/06/bigstock-Closed-Padlock-On-Digital-Back-392379260_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/cyber-security-requirements-on-the-horizon-as-ransomware-surges/" class="_self" target="_self" >Cyber Security Requirements on the Horizon As Ransomware Surges</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/three-ways-to-prepare-for-data-privacy-laws/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2021/06/bigstock-Positive-Cartoon-Character-Wit-401158358_1024X684-300x200.png" class="pt-cv-thumbnail" alt="" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2021/06/bigstock-Positive-Cartoon-Character-Wit-401158358_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2021/06/bigstock-Positive-Cartoon-Character-Wit-401158358_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2021/06/bigstock-Positive-Cartoon-Character-Wit-401158358_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2021/06/bigstock-Positive-Cartoon-Character-Wit-401158358_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2021/06/bigstock-Positive-Cartoon-Character-Wit-401158358_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/three-ways-to-prepare-for-data-privacy-laws/" class="_self" target="_self" >Three Ways To Prepare for Data Privacy Laws</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/cyber-security-demand-is-expected-to-grow-is-your-organization-prepared/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2021/05/bigstock-Cyber-Security-Safe-Data-Prote-412364470_1024X684-300x200.png" class="pt-cv-thumbnail" alt="" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2021/05/bigstock-Cyber-Security-Safe-Data-Prote-412364470_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2021/05/bigstock-Cyber-Security-Safe-Data-Prote-412364470_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2021/05/bigstock-Cyber-Security-Safe-Data-Prote-412364470_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2021/05/bigstock-Cyber-Security-Safe-Data-Prote-412364470_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2021/05/bigstock-Cyber-Security-Safe-Data-Prote-412364470_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/cyber-security-demand-is-expected-to-grow-is-your-organization-prepared/" class="_self" target="_self" >Cyber Security Demand is Expected to Grow. Is Your Organization Prepared? </a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/six-expert-recommendations-for-building-an-effective-cyber-security-strategy/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2021/04/bigstock-Office-Woman-With-Laptop-Talki-414537584_1024X684-300x200.png" class="pt-cv-thumbnail" alt="" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2021/04/bigstock-Office-Woman-With-Laptop-Talki-414537584_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2021/04/bigstock-Office-Woman-With-Laptop-Talki-414537584_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2021/04/bigstock-Office-Woman-With-Laptop-Talki-414537584_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2021/04/bigstock-Office-Woman-With-Laptop-Talki-414537584_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2021/04/bigstock-Office-Woman-With-Laptop-Talki-414537584_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/six-expert-recommendations-for-building-an-effective-cyber-security-strategy/" class="_self" target="_self" >Six Expert Recommendations for Building an Effective Cyber Security Strategy </a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/automakers-rev-up-for-growing-cyber-security-risks/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2021/04/bigstock-Car-Service-Future-With-Hud-In-358366118_1024X684-300x200.png" class="pt-cv-thumbnail" alt="automakers-cyber-security" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2021/04/bigstock-Car-Service-Future-With-Hud-In-358366118_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2021/04/bigstock-Car-Service-Future-With-Hud-In-358366118_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2021/04/bigstock-Car-Service-Future-With-Hud-In-358366118_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2021/04/bigstock-Car-Service-Future-With-Hud-In-358366118_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2021/04/bigstock-Car-Service-Future-With-Hud-In-358366118_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/automakers-rev-up-for-growing-cyber-security-risks/" class="_self" target="_self" >Automakers Rev Up for Growing Cyber Security Risks  </a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/three-ways-to-establish-a-digital-transformation-cloud-strategy/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2021/04/bigstock-Cloud-Technology-The-Human-Ha-411057763_1024X684-300x200.png" class="pt-cv-thumbnail" alt="digital-transformation-cloud" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2021/04/bigstock-Cloud-Technology-The-Human-Ha-411057763_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2021/04/bigstock-Cloud-Technology-The-Human-Ha-411057763_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2021/04/bigstock-Cloud-Technology-The-Human-Ha-411057763_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2021/04/bigstock-Cloud-Technology-The-Human-Ha-411057763_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2021/04/bigstock-Cloud-Technology-The-Human-Ha-411057763_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/three-ways-to-establish-a-digital-transformation-cloud-strategy/" class="_self" target="_self" >Three Ways to Establish a Digital Transformation Cloud Strategy</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/cyber-security-attacks-are-on-the-rise-is-your-workforce-sufficiently-trained-to-deal-with-them/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2021/03/bigstock-Laptop-Computer-Have-Folder-Lo-115302527_1024X684-300x200.png" class="pt-cv-thumbnail" alt="cyber-security-attacks" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2021/03/bigstock-Laptop-Computer-Have-Folder-Lo-115302527_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2021/03/bigstock-Laptop-Computer-Have-Folder-Lo-115302527_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2021/03/bigstock-Laptop-Computer-Have-Folder-Lo-115302527_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2021/03/bigstock-Laptop-Computer-Have-Folder-Lo-115302527_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2021/03/bigstock-Laptop-Computer-Have-Folder-Lo-115302527_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/cyber-security-attacks-are-on-the-rise-is-your-workforce-sufficiently-trained-to-deal-with-them/" class="_self" target="_self" >Cyber Security Attacks Are on the Rise. Is Your Workforce Sufficiently Trained to Deal With Them?</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/new-enisa-and-jrc-report-provides-guidance-on-cyber-security-for-autonomous-vehicles/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2021/03/bigstock-Smart-Transport-Technology-Con-380123179_1024X684-300x200.png" class="pt-cv-thumbnail" alt="UNISA-automotive-cyber-security-report" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2021/03/bigstock-Smart-Transport-Technology-Con-380123179_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2021/03/bigstock-Smart-Transport-Technology-Con-380123179_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2021/03/bigstock-Smart-Transport-Technology-Con-380123179_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2021/03/bigstock-Smart-Transport-Technology-Con-380123179_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2021/03/bigstock-Smart-Transport-Technology-Con-380123179_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/new-enisa-and-jrc-report-provides-guidance-on-cyber-security-for-autonomous-vehicles/" class="_self" target="_self" >New ENISA and JRC Report Provides Guidance on Cyber Security for Autonomous Vehicles</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/how-organizations-can-adapt-to-digital-transformation/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2021/03/bigstock-Concept-Of-Digitization-Of-Bus-410298934_1024X684-300x200.png" class="pt-cv-thumbnail" alt="adapt-to-digital-transformation" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2021/03/bigstock-Concept-Of-Digitization-Of-Bus-410298934_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2021/03/bigstock-Concept-Of-Digitization-Of-Bus-410298934_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2021/03/bigstock-Concept-Of-Digitization-Of-Bus-410298934_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2021/03/bigstock-Concept-Of-Digitization-Of-Bus-410298934_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2021/03/bigstock-Concept-Of-Digitization-Of-Bus-410298934_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/how-organizations-can-adapt-to-digital-transformation/" class="_self" target="_self" >How Organizations Can Adapt to Digital Transformation</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/five-proactive-ways-organizations-can-avoid-cyber-security-threats-in-2021/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2021/02/bigstock-Computer-Laptop-Online-Protect-353635970_1024X684-300x200.png" class="pt-cv-thumbnail" alt="avoid-cyber-security-threats-best-practices" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2021/02/bigstock-Computer-Laptop-Online-Protect-353635970_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2021/02/bigstock-Computer-Laptop-Online-Protect-353635970_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2021/02/bigstock-Computer-Laptop-Online-Protect-353635970_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2021/02/bigstock-Computer-Laptop-Online-Protect-353635970_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2021/02/bigstock-Computer-Laptop-Online-Protect-353635970_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/five-proactive-ways-organizations-can-avoid-cyber-security-threats-in-2021/" class="_self" target="_self" >Five Proactive Ways Organizations Can Avoid Cyber Security Threats in 2021</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/u-s-national-highway-traffic-safety-administration-releases-update-to-automotive-cyber-security-best-practices/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2021/01/bigstock-Set-Line-Mobile-And-Password-389568637_1024X684-300x200.png" class="pt-cv-thumbnail" alt="automotive-cyber-security-best-practices" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2021/01/bigstock-Set-Line-Mobile-And-Password-389568637_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2021/01/bigstock-Set-Line-Mobile-And-Password-389568637_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2021/01/bigstock-Set-Line-Mobile-And-Password-389568637_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2021/01/bigstock-Set-Line-Mobile-And-Password-389568637_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2021/01/bigstock-Set-Line-Mobile-And-Password-389568637_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/u-s-national-highway-traffic-safety-administration-releases-update-to-automotive-cyber-security-best-practices/" class="_self" target="_self" >U.S. National Highway Traffic Safety Administration Releases Update to Automotive Cyber Security Best Practices</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/how-can-large-connected-vehicle-fleets-be-protected-against-cyber-attacks/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2020/12/bigstock-Fleet-of-commercial-delivery-t-146849045_1024X684-300x200.png" class="pt-cv-thumbnail" alt="vehicle-fleets-autonomous-vehicle-cyber-security" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2020/12/bigstock-Fleet-of-commercial-delivery-t-146849045_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2020/12/bigstock-Fleet-of-commercial-delivery-t-146849045_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2020/12/bigstock-Fleet-of-commercial-delivery-t-146849045_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2020/12/bigstock-Fleet-of-commercial-delivery-t-146849045_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2020/12/bigstock-Fleet-of-commercial-delivery-t-146849045_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/how-can-large-connected-vehicle-fleets-be-protected-against-cyber-attacks/" class="_self" target="_self" >How Can Large Connected Vehicle Fleets Be Protected Against Cyber Attacks?</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/how-the-covid-19-pandemic-is-impacting-cyber-security-worldwide/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2020/12/image-from-rawpixel-id-1029356-original_1024X684-300x200.png" class="pt-cv-thumbnail" alt="cyber-security-2021" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2020/12/image-from-rawpixel-id-1029356-original_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2020/12/image-from-rawpixel-id-1029356-original_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2020/12/image-from-rawpixel-id-1029356-original_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2020/12/image-from-rawpixel-id-1029356-original_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2020/12/image-from-rawpixel-id-1029356-original_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/how-the-covid-19-pandemic-is-impacting-cyber-security-worldwide/" class="_self" target="_self" >How the COVID-19 Pandemic is Impacting Cyber Security Worldwide </a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/amid-pandemic-vehicle-manufacturers-race-to-meet-new-cyber-security-regulations/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2020/11/bigstock-An-Engineer-At-A-Futuristic-Fa-376506700-Converted_1024X684-300x200.png" class="pt-cv-thumbnail" alt="autonomous-vehicle-manufacturers-cyber-security-regulations" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2020/11/bigstock-An-Engineer-At-A-Futuristic-Fa-376506700-Converted_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2020/11/bigstock-An-Engineer-At-A-Futuristic-Fa-376506700-Converted_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2020/11/bigstock-An-Engineer-At-A-Futuristic-Fa-376506700-Converted_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2020/11/bigstock-An-Engineer-At-A-Futuristic-Fa-376506700-Converted_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2020/11/bigstock-An-Engineer-At-A-Futuristic-Fa-376506700-Converted_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/amid-pandemic-vehicle-manufacturers-race-to-meet-new-cyber-security-regulations/" class="_self" target="_self" >Amid Pandemic, Vehicle Manufacturers Race To Meet New Cyber Security Regulations </a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/is-confidential-computing-the-future-of-cloud-security/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2020/10/bigstock-d-Illustration-Of-Cloud-Comp-343559839_1024X684-300x200.jpg" class="pt-cv-thumbnail" alt="confidential-computing" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2020/10/bigstock-d-Illustration-Of-Cloud-Comp-343559839_1024X684-300x200.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2020/10/bigstock-d-Illustration-Of-Cloud-Comp-343559839_1024X684-768x513.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2020/10/bigstock-d-Illustration-Of-Cloud-Comp-343559839_1024X684-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2020/10/bigstock-d-Illustration-Of-Cloud-Comp-343559839_1024X684-272x182.jpg 272w, https://innovationatwork.ieee.org/wp-content/uploads/2020/10/bigstock-d-Illustration-Of-Cloud-Comp-343559839_1024X684.jpg 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/is-confidential-computing-the-future-of-cloud-security/" class="_self" target="_self" >Is Confidential Computing the Future of Cloud Security? </a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/five-major-cyber-security-threats-for-automakers/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2020/10/bigstock-176355691.jpg_1024X684-300x200.png" class="pt-cv-thumbnail" alt="cyber-security-threats-for-automakers" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2020/10/bigstock-176355691.jpg_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2020/10/bigstock-176355691.jpg_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2020/10/bigstock-176355691.jpg_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2020/10/bigstock-176355691.jpg_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2020/10/bigstock-176355691.jpg_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/five-major-cyber-security-threats-for-automakers/" class="_self" target="_self" >Five Major Cyber Security Threats for Automakers</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/six-ways-to-protect-against-autonomous-vehicle-cyber-attacks/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2020/09/bigstock-Cyber-Security-Theme-With-Aeri-360742981_1024X684-300x200.png" class="pt-cv-thumbnail" alt="autonomous-vehicle-cyber-attacks" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2020/09/bigstock-Cyber-Security-Theme-With-Aeri-360742981_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2020/09/bigstock-Cyber-Security-Theme-With-Aeri-360742981_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2020/09/bigstock-Cyber-Security-Theme-With-Aeri-360742981_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2020/09/bigstock-Cyber-Security-Theme-With-Aeri-360742981_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2020/09/bigstock-Cyber-Security-Theme-With-Aeri-360742981_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/six-ways-to-protect-against-autonomous-vehicle-cyber-attacks/" class="_self" target="_self" >Six Ways to Protect Against Autonomous Vehicle Cyber Attacks</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/creating-safer-interconnected-vehicles/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2020/08/bigstock-Smart-Car-Security-System-Icon-295284217_1024X684-300x200.png" class="pt-cv-thumbnail" alt="interconnected-vehicles" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2020/08/bigstock-Smart-Car-Security-System-Icon-295284217_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2020/08/bigstock-Smart-Car-Security-System-Icon-295284217_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2020/08/bigstock-Smart-Car-Security-System-Icon-295284217_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2020/08/bigstock-Smart-Car-Security-System-Icon-295284217_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2020/08/bigstock-Smart-Car-Security-System-Icon-295284217_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/creating-safer-interconnected-vehicles/" class="_self" target="_self" >Creating Safer Interconnected Vehicles</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/rush-to-cloud-computing-raises-security-concerns/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2020/08/bigstock-d-Illustration-Of-Cloud-Comp-343825630_1024X684-300x200.png" class="pt-cv-thumbnail" alt="" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2020/08/bigstock-d-Illustration-Of-Cloud-Comp-343825630_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2020/08/bigstock-d-Illustration-Of-Cloud-Comp-343825630_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2020/08/bigstock-d-Illustration-Of-Cloud-Comp-343825630_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2020/08/bigstock-d-Illustration-Of-Cloud-Comp-343825630_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2020/08/bigstock-d-Illustration-Of-Cloud-Comp-343825630_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/rush-to-cloud-computing-raises-security-concerns/" class="_self" target="_self" >Rush to Cloud Computing Raises Security Concerns</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/rush-to-contact-tracing-apps-expose-conflict-between-data-privacy-and-public-health/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2020/08/bigstock-Tracking-People-s-Location-And-366472825_1024X684-300x200.png" class="pt-cv-thumbnail" alt="contact-tracing-apps" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2020/08/bigstock-Tracking-People-s-Location-And-366472825_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2020/08/bigstock-Tracking-People-s-Location-And-366472825_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2020/08/bigstock-Tracking-People-s-Location-And-366472825_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2020/08/bigstock-Tracking-People-s-Location-And-366472825_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2020/08/bigstock-Tracking-People-s-Location-And-366472825_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/rush-to-contact-tracing-apps-expose-conflict-between-data-privacy-and-public-health/" class="_self" target="_self" >Rush to Contact-Tracing Apps Expose Conflict Between Data Privacy and Public Health</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/un-announces-new-cyber-security-regulation-for-connected-vehicles/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2020/07/bigstock-Aerial-View-Of-Sathorn-Road-B-352808525_1024X684-300x200.png" class="pt-cv-thumbnail" alt="cyber-security-regulation-connected-vehicle" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2020/07/bigstock-Aerial-View-Of-Sathorn-Road-B-352808525_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2020/07/bigstock-Aerial-View-Of-Sathorn-Road-B-352808525_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2020/07/bigstock-Aerial-View-Of-Sathorn-Road-B-352808525_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2020/07/bigstock-Aerial-View-Of-Sathorn-Road-B-352808525_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2020/07/bigstock-Aerial-View-Of-Sathorn-Road-B-352808525_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/un-announces-new-cyber-security-regulation-for-connected-vehicles/" class="_self" target="_self" >U.N. Announces New Cyber Security Regulation for Connected Vehicles</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/student-research-team-create-prototype-of-secure-vehicle-to-vehicle-v2v-communications-system/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2020/07/bigstock-Smart-Car-Self-driving-Mode-V-315486445_1024X684-300x200.png" class="pt-cv-thumbnail" alt="vehicle-to-vehicle-v2x-communication-systems" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2020/07/bigstock-Smart-Car-Self-driving-Mode-V-315486445_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2020/07/bigstock-Smart-Car-Self-driving-Mode-V-315486445_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2020/07/bigstock-Smart-Car-Self-driving-Mode-V-315486445_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2020/07/bigstock-Smart-Car-Self-driving-Mode-V-315486445_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2020/07/bigstock-Smart-Car-Self-driving-Mode-V-315486445_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/student-research-team-create-prototype-of-secure-vehicle-to-vehicle-v2v-communications-system/" class="_self" target="_self" >Student Research Team Create Prototype of Secure Vehicle-to-Vehicle (V2V) Communications System </a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/how-can-autonomous-vehicles-be-protected-against-cyber-security-threats/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2020/05/bigstock-196026349_1024X684-300x200.png" class="pt-cv-thumbnail" alt="autonomous-vehicle-cyber-security-theats" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2020/05/bigstock-196026349_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2020/05/bigstock-196026349_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2020/05/bigstock-196026349_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2020/05/bigstock-196026349_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2020/05/bigstock-196026349_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/how-can-autonomous-vehicles-be-protected-against-cyber-security-threats/" class="_self" target="_self" >How Can Autonomous Vehicles Be Protected Against Cyber Security Threats?</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/edge-computing-security-issues-and-trends-to-watch-in-2020/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2020/05/bigstock-Abstract-Cyber-Security-Concep-355999346_1024X684-300x200.png" class="pt-cv-thumbnail" alt="edge-computing-security" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2020/05/bigstock-Abstract-Cyber-Security-Concep-355999346_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2020/05/bigstock-Abstract-Cyber-Security-Concep-355999346_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2020/05/bigstock-Abstract-Cyber-Security-Concep-355999346_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2020/05/bigstock-Abstract-Cyber-Security-Concep-355999346_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2020/05/bigstock-Abstract-Cyber-Security-Concep-355999346_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/edge-computing-security-issues-and-trends-to-watch-in-2020/" class="_self" target="_self" >Edge Computing: Security Issues and Trends to Watch in 2020</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/understanding-child-data-privacy-for-distance-learning/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2020/04/bigstock-Portrait-Of-Teenage-Girl-Learn-347018476_1024X684-300x200.png" class="pt-cv-thumbnail" alt="student-child-data-privacy-concerns" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2020/04/bigstock-Portrait-Of-Teenage-Girl-Learn-347018476_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2020/04/bigstock-Portrait-Of-Teenage-Girl-Learn-347018476_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2020/04/bigstock-Portrait-Of-Teenage-Girl-Learn-347018476_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2020/04/bigstock-Portrait-Of-Teenage-Girl-Learn-347018476_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2020/04/bigstock-Portrait-Of-Teenage-Girl-Learn-347018476_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/understanding-child-data-privacy-for-distance-learning/" class="_self" target="_self" >Understanding Child Data Privacy for Distance Learning</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/developments-and-challenges-influencing-the-advancement-of-5g/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2020/04/bigstock-Young-People-Using-g-High-Spe-350518603_1024X684-300x200.png" class="pt-cv-thumbnail" alt="5g-delays" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2020/04/bigstock-Young-People-Using-g-High-Spe-350518603_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2020/04/bigstock-Young-People-Using-g-High-Spe-350518603_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2020/04/bigstock-Young-People-Using-g-High-Spe-350518603_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2020/04/bigstock-Young-People-Using-g-High-Spe-350518603_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2020/04/bigstock-Young-People-Using-g-High-Spe-350518603_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/developments-and-challenges-influencing-the-advancement-of-5g/" class="_self" target="_self" >Developments and Challenges Influencing the Advancement of 5G </a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/challenges-and-solutions-to-expanding-the-internet-of-things/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2020/03/bigstock-Smart-City-Concept-With-Icon-331437364_1024X684-300x200.png" class="pt-cv-thumbnail" alt="internet-of-things-challenges-and-benefits" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2020/03/bigstock-Smart-City-Concept-With-Icon-331437364_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2020/03/bigstock-Smart-City-Concept-With-Icon-331437364_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2020/03/bigstock-Smart-City-Concept-With-Icon-331437364_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2020/03/bigstock-Smart-City-Concept-With-Icon-331437364_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2020/03/bigstock-Smart-City-Concept-With-Icon-331437364_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/challenges-and-solutions-to-expanding-the-internet-of-things/" class="_self" target="_self" >Challenges and Solutions to Expanding the Internet of Things</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/making-the-workplace-culture-more-welcoming-to-women-in-stem/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2020/03/bigstock-Crowd-Of-Women-Seamless-Patter-344981158_1024X684-300x200.png" class="pt-cv-thumbnail" alt="women-in-cyber-security" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2020/03/bigstock-Crowd-Of-Women-Seamless-Patter-344981158_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2020/03/bigstock-Crowd-Of-Women-Seamless-Patter-344981158_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2020/03/bigstock-Crowd-Of-Women-Seamless-Patter-344981158_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2020/03/bigstock-Crowd-Of-Women-Seamless-Patter-344981158_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2020/03/bigstock-Crowd-Of-Women-Seamless-Patter-344981158_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/making-the-workplace-culture-more-welcoming-to-women-in-stem/" class="_self" target="_self" >Making the Workplace Culture More Welcoming to Women in STEM</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/as-hackers-get-smarter-cyber-security-experts-turn-to-new-ideas/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2020/03/bigstock-Isometric-Internet-Hacker-Atta-346273381_1024X684-300x200.png" class="pt-cv-thumbnail" alt="artificial-intelligence-cyber-security-practices" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2020/03/bigstock-Isometric-Internet-Hacker-Atta-346273381_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2020/03/bigstock-Isometric-Internet-Hacker-Atta-346273381_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2020/03/bigstock-Isometric-Internet-Hacker-Atta-346273381_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2020/03/bigstock-Isometric-Internet-Hacker-Atta-346273381_1024X684-272x182.png 272w, https://innovationatwork.ieee.org/wp-content/uploads/2020/03/bigstock-Isometric-Internet-Hacker-Atta-346273381_1024X684.png 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/as-hackers-get-smarter-cyber-security-experts-turn-to-new-ideas/" class="_self" target="_self" >As Hackers Get Smarter, Cyber Security Experts Turn to New Ideas</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/closing-the-cyber-security-skills-gap/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2020/01/bigstock-Cyber-Security-And-Digital-Dat-32110980_1024X684-300x200.jpg" class="pt-cv-thumbnail" alt="cyber-security-skills-gap" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2020/01/bigstock-Cyber-Security-And-Digital-Dat-32110980_1024X684-300x200.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2020/01/bigstock-Cyber-Security-And-Digital-Dat-32110980_1024X684-768x513.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2020/01/bigstock-Cyber-Security-And-Digital-Dat-32110980_1024X684.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2020/01/bigstock-Cyber-Security-And-Digital-Dat-32110980_1024X684-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2020/01/bigstock-Cyber-Security-And-Digital-Dat-32110980_1024X684-272x182.jpg 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/closing-the-cyber-security-skills-gap/" class="_self" target="_self" >Closing the Cyber Security Skills Gap</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/cyber-security-for-remote-workers/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2019/12/bigstock-Laptop-Connection-On-Cloud-Sto-267025336_1024X684-300x200.png" class="pt-cv-thumbnail" alt="cyber-security-remote-workers-tips" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2019/12/bigstock-Laptop-Connection-On-Cloud-Sto-267025336_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2019/12/bigstock-Laptop-Connection-On-Cloud-Sto-267025336_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2019/12/bigstock-Laptop-Connection-On-Cloud-Sto-267025336_1024X684.png 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2019/12/bigstock-Laptop-Connection-On-Cloud-Sto-267025336_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2019/12/bigstock-Laptop-Connection-On-Cloud-Sto-267025336_1024X684-272x182.png 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/cyber-security-for-remote-workers/" class="_self" target="_self" >Cyber Security for Remote Workers</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/microsegmentation-for-healthcare-systems/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2019/12/bigstock-Electronic-Medical-Record-With-267752419_1024X684-300x200.png" class="pt-cv-thumbnail" alt="microsegmentation-healthcare-industry-cyber-security" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2019/12/bigstock-Electronic-Medical-Record-With-267752419_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2019/12/bigstock-Electronic-Medical-Record-With-267752419_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2019/12/bigstock-Electronic-Medical-Record-With-267752419_1024X684.png 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2019/12/bigstock-Electronic-Medical-Record-With-267752419_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2019/12/bigstock-Electronic-Medical-Record-With-267752419_1024X684-272x182.png 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/microsegmentation-for-healthcare-systems/" class="_self" target="_self" >Microsegmentation for Healthcare Systems</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/cyber-security-advancing-through-ai/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2019/11/bigstock-Internet-Security-Firewall-Or-326464240_1024X684-300x200.png" class="pt-cv-thumbnail" alt="cyber-security-artificial-intelligence-ai" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2019/11/bigstock-Internet-Security-Firewall-Or-326464240_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2019/11/bigstock-Internet-Security-Firewall-Or-326464240_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2019/11/bigstock-Internet-Security-Firewall-Or-326464240_1024X684.png 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2019/11/bigstock-Internet-Security-Firewall-Or-326464240_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2019/11/bigstock-Internet-Security-Firewall-Or-326464240_1024X684-272x182.png 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/cyber-security-advancing-through-ai/" class="_self" target="_self" >Cyber Security—Advancing through AI</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/5-reasons-to-consider-a-career-in-cyber-security/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2019/10/bigstock-Businesspeople-Walking-In-The-304694494_1024X684-300x200.png" class="pt-cv-thumbnail" alt="cyber-security-career" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2019/10/bigstock-Businesspeople-Walking-In-The-304694494_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2019/10/bigstock-Businesspeople-Walking-In-The-304694494_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2019/10/bigstock-Businesspeople-Walking-In-The-304694494_1024X684.png 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2019/10/bigstock-Businesspeople-Walking-In-The-304694494_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2019/10/bigstock-Businesspeople-Walking-In-The-304694494_1024X684-272x182.png 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/5-reasons-to-consider-a-career-in-cyber-security/" class="_self" target="_self" >Five Reasons to Consider a Career in Cyber Security</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/cloud-security-threats/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2019/10/bigstock-Technology-Security-Concept-M-306674203_1024X684-300x200.png" class="pt-cv-thumbnail" alt="cloud-security-storage-risks-cyber-attacks" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2019/10/bigstock-Technology-Security-Concept-M-306674203_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2019/10/bigstock-Technology-Security-Concept-M-306674203_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2019/10/bigstock-Technology-Security-Concept-M-306674203_1024X684.png 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2019/10/bigstock-Technology-Security-Concept-M-306674203_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2019/10/bigstock-Technology-Security-Concept-M-306674203_1024X684-272x182.png 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/cloud-security-threats/" class="_self" target="_self" >Cloud Security Threats</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/privacy-with-interconnected-devices/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2019/10/bigstock-Mixed-Race-Woman-In-Glasses-Wo-261351169_bigstock-d-Sound-Waves-With-Colored-Do-271034662_1024X684-300x200.png" class="pt-cv-thumbnail" alt="interconnected-devices-data-privacy" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2019/10/bigstock-Mixed-Race-Woman-In-Glasses-Wo-261351169_bigstock-d-Sound-Waves-With-Colored-Do-271034662_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2019/10/bigstock-Mixed-Race-Woman-In-Glasses-Wo-261351169_bigstock-d-Sound-Waves-With-Colored-Do-271034662_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2019/10/bigstock-Mixed-Race-Woman-In-Glasses-Wo-261351169_bigstock-d-Sound-Waves-With-Colored-Do-271034662_1024X684.png 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2019/10/bigstock-Mixed-Race-Woman-In-Glasses-Wo-261351169_bigstock-d-Sound-Waves-With-Colored-Do-271034662_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2019/10/bigstock-Mixed-Race-Woman-In-Glasses-Wo-261351169_bigstock-d-Sound-Waves-With-Colored-Do-271034662_1024X684-272x182.png 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/privacy-with-interconnected-devices/" class="_self" target="_self" >Privacy with Interconnected Devices</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/blockchain-smartphones-going-mobile/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2019/09/bigstock-Bitcoin-Wallet-Interface-On-Sm-287218699_1024X684-300x200.png" class="pt-cv-thumbnail" alt="blockchain-smartphone-applications" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2019/09/bigstock-Bitcoin-Wallet-Interface-On-Sm-287218699_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2019/09/bigstock-Bitcoin-Wallet-Interface-On-Sm-287218699_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2019/09/bigstock-Bitcoin-Wallet-Interface-On-Sm-287218699_1024X684.png 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2019/09/bigstock-Bitcoin-Wallet-Interface-On-Sm-287218699_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2019/09/bigstock-Bitcoin-Wallet-Interface-On-Sm-287218699_1024X684-272x182.png 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/blockchain-smartphones-going-mobile/" class="_self" target="_self" >Blockchain Smartphones—Going Mobile</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/cyber-security-in-the-world-around-you/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2019/09/bigstock-Close-Up-Smartphone-Social-Med-286844728_1024X684-300x200.png" class="pt-cv-thumbnail" alt="cyber-security-smartphone" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2019/09/bigstock-Close-Up-Smartphone-Social-Med-286844728_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2019/09/bigstock-Close-Up-Smartphone-Social-Med-286844728_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2019/09/bigstock-Close-Up-Smartphone-Social-Med-286844728_1024X684.png 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2019/09/bigstock-Close-Up-Smartphone-Social-Med-286844728_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2019/09/bigstock-Close-Up-Smartphone-Social-Med-286844728_1024X684-272x182.png 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/cyber-security-in-the-world-around-you/" class="_self" target="_self" >Cyber Security in the World Around You</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/growing-cloud-computing-utilization-in-2019/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2019/09/bigstock-d-Rendering-Cloud-Computing-267217441_1024X684-300x200.jpg" class="pt-cv-thumbnail" alt="cloud-computing-types" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2019/09/bigstock-d-Rendering-Cloud-Computing-267217441_1024X684-300x200.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2019/09/bigstock-d-Rendering-Cloud-Computing-267217441_1024X684-768x513.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2019/09/bigstock-d-Rendering-Cloud-Computing-267217441_1024X684.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2019/09/bigstock-d-Rendering-Cloud-Computing-267217441_1024X684-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2019/09/bigstock-d-Rendering-Cloud-Computing-267217441_1024X684-272x182.jpg 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/growing-cloud-computing-utilization-in-2019/" class="_self" target="_self" >Growing Cloud Computing Utilization in 2019</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/breach-in-biometric-security/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2019/08/bigstock-Fingerprint-Scanning-Identific-282148945_1024X684-300x200.jpg" class="pt-cv-thumbnail" alt="biometrics-security-system-breach" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2019/08/bigstock-Fingerprint-Scanning-Identific-282148945_1024X684-300x200.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2019/08/bigstock-Fingerprint-Scanning-Identific-282148945_1024X684-768x513.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2019/08/bigstock-Fingerprint-Scanning-Identific-282148945_1024X684.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2019/08/bigstock-Fingerprint-Scanning-Identific-282148945_1024X684-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2019/08/bigstock-Fingerprint-Scanning-Identific-282148945_1024X684-272x182.jpg 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/breach-in-biometric-security/" class="_self" target="_self" >A Breach in Biometric Security</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/global-cyber-security-threat-combined-with-a-severe-talent-shortage-presents-enormous-opportunity/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2019/07/bigstock-World-Map-With-Closed-Pad-Lock-276995884_1024X684-300x200.jpg" class="pt-cv-thumbnail" alt="global-cyber-security-shortage" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2019/07/bigstock-World-Map-With-Closed-Pad-Lock-276995884_1024X684-300x200.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2019/07/bigstock-World-Map-With-Closed-Pad-Lock-276995884_1024X684-768x513.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2019/07/bigstock-World-Map-With-Closed-Pad-Lock-276995884_1024X684.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2019/07/bigstock-World-Map-With-Closed-Pad-Lock-276995884_1024X684-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2019/07/bigstock-World-Map-With-Closed-Pad-Lock-276995884_1024X684-272x182.jpg 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/global-cyber-security-threat-combined-with-a-severe-talent-shortage-presents-enormous-opportunity/" class="_self" target="_self" >Global Cyber Security Threat Combined with a Severe Talent Shortage Presents Enormous Opportunity</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/15-tips-to-help-protect-against-cyber-attacks-while-traveling/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2019/06/15-Tips-to-Help-Protect-Against-Cyber-Attacks-While-Traveling_1024X684-300x200.png" class="pt-cv-thumbnail" alt="tips-to-protect-against-cyber-attacks-while-traveling" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2019/06/15-Tips-to-Help-Protect-Against-Cyber-Attacks-While-Traveling_1024X684-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2019/06/15-Tips-to-Help-Protect-Against-Cyber-Attacks-While-Traveling_1024X684-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2019/06/15-Tips-to-Help-Protect-Against-Cyber-Attacks-While-Traveling_1024X684.png 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2019/06/15-Tips-to-Help-Protect-Against-Cyber-Attacks-While-Traveling_1024X684-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2019/06/15-Tips-to-Help-Protect-Against-Cyber-Attacks-While-Traveling_1024X684-272x182.png 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/15-tips-to-help-protect-against-cyber-attacks-while-traveling/" class="_self" target="_self" >15 Tips to Help Protect Against Cyber Attacks While Traveling</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/gdpr-myths-still-exist-a-year-later/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2019/05/IAW_GDPR-Myths-Still-Exist-a-Year-Later_EU-Flag-300x200.png" class="pt-cv-thumbnail" alt="gdpr myths eu flag" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2019/05/IAW_GDPR-Myths-Still-Exist-a-Year-Later_EU-Flag-300x200.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2019/05/IAW_GDPR-Myths-Still-Exist-a-Year-Later_EU-Flag-768x513.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2019/05/IAW_GDPR-Myths-Still-Exist-a-Year-Later_EU-Flag.png 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2019/05/IAW_GDPR-Myths-Still-Exist-a-Year-Later_EU-Flag-150x100.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2019/05/IAW_GDPR-Myths-Still-Exist-a-Year-Later_EU-Flag-272x182.png 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/gdpr-myths-still-exist-a-year-later/" class="_self" target="_self" >GDPR Myths Still Exist a Year Later</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/9-cyber-security-tips-to-avoid-exposing-your-data/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2019/05/icons8-team-1221960-unsplash-300x200.jpg" class="pt-cv-thumbnail" alt="cyber security tips" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2019/05/icons8-team-1221960-unsplash-300x200.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2019/05/icons8-team-1221960-unsplash-768x513.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2019/05/icons8-team-1221960-unsplash-1024x684.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2019/05/icons8-team-1221960-unsplash-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2019/05/icons8-team-1221960-unsplash-272x182.jpg 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/9-cyber-security-tips-to-avoid-exposing-your-data/" class="_self" target="_self" >9 Cyber Security Tips to Avoid Exposing Your Data</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/7-tips-for-starting-a-career-in-cyber-security/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2019/04/bigstock-208142200-300x200.jpg" class="pt-cv-thumbnail" alt="" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2019/04/bigstock-208142200-300x200.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2019/04/bigstock-208142200-768x512.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2019/04/bigstock-208142200-1024x683.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2019/04/bigstock-208142200-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2019/04/bigstock-208142200-272x182.jpg 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/7-tips-for-starting-a-career-in-cyber-security/" class="_self" target="_self" >7 Tips for Starting a Career in Cyber Security</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/in-case-you-missed-it-cyber-security-news/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="169" src="https://innovationatwork.ieee.org/wp-content/uploads/2019/04/taskin-ashiq-464194-unsplash-300x169.jpg" class="pt-cv-thumbnail" alt="" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2019/04/taskin-ashiq-464194-unsplash-300x169.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2019/04/taskin-ashiq-464194-unsplash-768x433.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2019/04/taskin-ashiq-464194-unsplash-1024x577.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2019/04/taskin-ashiq-464194-unsplash-150x85.jpg 150w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/in-case-you-missed-it-cyber-security-news/" class="_self" target="_self" >In Case You Missed It: Cyber Security News</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/how-professional-development-programs-help-engineers-and-others-succeed/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2019/03/bigstock-204807592-300x200.jpg" class="pt-cv-thumbnail" alt="Professional development programs engineers engineering pdh ceu continuing education classes best technical training" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2019/03/bigstock-204807592-300x200.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2019/03/bigstock-204807592-768x512.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2019/03/bigstock-204807592-1024x683.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2019/03/bigstock-204807592-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2019/03/bigstock-204807592-272x182.jpg 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/how-professional-development-programs-help-engineers-and-others-succeed/" class="_self" target="_self" >How Professional Development Programs Help Engineers and Others Succeed</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/3-fundamentals-of-effective-cybersecurity-for-every-business/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="208" src="https://innovationatwork.ieee.org/wp-content/uploads/2019/03/bigstock-162229583-300x208.jpg" class="pt-cv-thumbnail" alt="cyber security fundamentals cybersecurity regulations" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2019/03/bigstock-162229583-300x208.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2019/03/bigstock-162229583-768x532.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2019/03/bigstock-162229583-1024x709.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2019/03/bigstock-162229583-150x104.jpg 150w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/3-fundamentals-of-effective-cybersecurity-for-every-business/" class="_self" target="_self" >3 Fundamentals of Effective Cyber Security for Every Business</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/how-gdpr-helps-marketers-surprise-and-delight-consumers/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2019/03/bigstock-Gdpr-general-Data-Protection-235058500-300x200.jpg" class="pt-cv-thumbnail" alt="GDPR european data privacy regulations opt in unsubscribe gdpr" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2019/03/bigstock-Gdpr-general-Data-Protection-235058500-300x200.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2019/03/bigstock-Gdpr-general-Data-Protection-235058500-768x512.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2019/03/bigstock-Gdpr-general-Data-Protection-235058500-1024x683.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2019/03/bigstock-Gdpr-general-Data-Protection-235058500-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2019/03/bigstock-Gdpr-general-Data-Protection-235058500-272x182.jpg 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/how-gdpr-helps-marketers-surprise-and-delight-consumers/" class="_self" target="_self" >GDPR Forcing Marketers to Put Privacy First</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/how-to-benefit-from-the-cyber-security-staffing-shortage/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2019/02/markus-spiske-207946-unsplash-1-300x200.jpg" class="pt-cv-thumbnail" alt="cyber security cybersecurity engineering jobs cyber attacks cyber threats cyber innovations" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2019/02/markus-spiske-207946-unsplash-1-300x200.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2019/02/markus-spiske-207946-unsplash-1-768x512.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2019/02/markus-spiske-207946-unsplash-1-1024x683.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2019/02/markus-spiske-207946-unsplash-1-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2019/02/markus-spiske-207946-unsplash-1-272x182.jpg 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/how-to-benefit-from-the-cyber-security-staffing-shortage/" class="_self" target="_self" >How to Benefit from the Cyber Security Staffing Shortage</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/are-upcoming-u-s-infrastructure-improvements-cyber-secure/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2018/12/bigstock-Washington-Dc-Usa-May-253761577-300x200.jpg" class="pt-cv-thumbnail" alt="cybersecurity cyber security infrastructure U.S. power grid security" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2018/12/bigstock-Washington-Dc-Usa-May-253761577-300x200.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2018/12/bigstock-Washington-Dc-Usa-May-253761577-768x512.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2018/12/bigstock-Washington-Dc-Usa-May-253761577-1024x683.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2018/12/bigstock-Washington-Dc-Usa-May-253761577-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2018/12/bigstock-Washington-Dc-Usa-May-253761577-272x182.jpg 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/are-upcoming-u-s-infrastructure-improvements-cyber-secure/" class="_self" target="_self" >Are Upcoming U.S. Infrastructure Improvements Cyber Secure?</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/what-is-a-cyber-security-maturity-model/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2018/11/bigstock-Hands-working-on-laptop-networ-175625125-300x200.jpg" class="pt-cv-thumbnail" alt="cybersecurity issues cyber attacks cyber security cryptojacking cyber training engineering courses on cyber" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2018/11/bigstock-Hands-working-on-laptop-networ-175625125-300x200.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2018/11/bigstock-Hands-working-on-laptop-networ-175625125-768x513.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2018/11/bigstock-Hands-working-on-laptop-networ-175625125-1024x684.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2018/11/bigstock-Hands-working-on-laptop-networ-175625125-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2018/11/bigstock-Hands-working-on-laptop-networ-175625125-272x182.jpg 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/what-is-a-cyber-security-maturity-model/" class="_self" target="_self" >What Is a Cyber Security Maturity Model?</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/theres-a-numbers-problem-in-cyber-security-and-women-are-the-solution/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2018/10/bigstock-Cyber-Security-With-Business-W-260659126-300x200.jpg" class="pt-cv-thumbnail" alt="Women in Cyber Security" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2018/10/bigstock-Cyber-Security-With-Business-W-260659126-300x200.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2018/10/bigstock-Cyber-Security-With-Business-W-260659126-768x512.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2018/10/bigstock-Cyber-Security-With-Business-W-260659126-1024x683.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2018/10/bigstock-Cyber-Security-With-Business-W-260659126-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2018/10/bigstock-Cyber-Security-With-Business-W-260659126-272x182.jpg 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/theres-a-numbers-problem-in-cyber-security-and-women-are-the-solution/" class="_self" target="_self" >There’s a Numbers Problem in Cyber Security and Women are the Solution</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/california-becomes-the-first-state-to-sign-iot-cyber-security-law-into-existence/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2018/10/bigstock-California-Senate-Chamber-69040912-1-300x200.jpg" class="pt-cv-thumbnail" alt="california cyber security" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2018/10/bigstock-California-Senate-Chamber-69040912-1-300x200.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2018/10/bigstock-California-Senate-Chamber-69040912-1-768x512.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2018/10/bigstock-California-Senate-Chamber-69040912-1-1024x683.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2018/10/bigstock-California-Senate-Chamber-69040912-1-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2018/10/bigstock-California-Senate-Chamber-69040912-1-272x182.jpg 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/california-becomes-the-first-state-to-sign-iot-cyber-security-law-into-existence/" class="_self" target="_self" >California Becomes the First State to Sign IoT Cyber Security Law into Existence</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/7-ways-to-get-employees-onboard-with-cyber-security-procedures/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="296" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/10/bigstock-Cybersecurity-Safety-Internet-44231350-300x296.jpg" class="pt-cv-thumbnail" alt="Are you #CyberAware? Cyber Security Awareness Month" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/10/bigstock-Cybersecurity-Safety-Internet-44231350-300x296.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2017/10/bigstock-Cybersecurity-Safety-Internet-44231350-768x758.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/10/bigstock-Cybersecurity-Safety-Internet-44231350-1024x1011.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2017/10/bigstock-Cybersecurity-Safety-Internet-44231350-150x148.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2017/10/bigstock-Cybersecurity-Safety-Internet-44231350-50x50.jpg 50w, https://innovationatwork.ieee.org/wp-content/uploads/2017/10/bigstock-Cybersecurity-Safety-Internet-44231350-45x45.jpg 45w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/7-ways-to-get-employees-onboard-with-cyber-security-procedures/" class="_self" target="_self" >7 Ways to Get Employees Onboard with Cyber Security Procedures</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/the-next-big-threat-in-cyber-security/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2018/09/bigstock-179570383-300x200.jpg" class="pt-cv-thumbnail" alt="cyber security threats cybersecurity attacks 2018 enterprise cyber attacks" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2018/09/bigstock-179570383-300x200.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2018/09/bigstock-179570383-768x513.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2018/09/bigstock-179570383-1024x684.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2018/09/bigstock-179570383-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2018/09/bigstock-179570383-272x182.jpg 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/the-next-big-threat-in-cyber-security/" class="_self" target="_self" >The Next Big Threat in Cyber Security</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/why-cyber-insurance-shouldnt-be-your-only-source-of-protection-against-an-attack/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="224" src="https://innovationatwork.ieee.org/wp-content/uploads/2018/08/bigstock-Business-Corporate-Protection-116102639-300x224.jpg" class="pt-cv-thumbnail" alt="what is cyber insurance and why do you need it, benefits of cyber insurance, corporate cyber security, ieee 2018" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2018/08/bigstock-Business-Corporate-Protection-116102639-300x224.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2018/08/bigstock-Business-Corporate-Protection-116102639-768x573.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2018/08/bigstock-Business-Corporate-Protection-116102639-1024x764.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2018/08/bigstock-Business-Corporate-Protection-116102639-150x112.jpg 150w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/why-cyber-insurance-shouldnt-be-your-only-source-of-protection-against-an-attack/" class="_self" target="_self" >Why Cyber Insurance Shouldn’t Be Your Only Source of Protection Against an Attack</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/7-tips-improve-your-small-business-cybersecurity/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="196" src="https://innovationatwork.ieee.org/wp-content/uploads/2018/05/bigstock-Cyber-Security-Business-Techn-187837759-300x196.jpg" class="pt-cv-thumbnail" alt="cyber security small business owners customers cyber attack IOT ethical hacking" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2018/05/bigstock-Cyber-Security-Business-Techn-187837759-300x196.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2018/05/bigstock-Cyber-Security-Business-Techn-187837759-768x502.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2018/05/bigstock-Cyber-Security-Business-Techn-187837759-1024x669.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2018/05/bigstock-Cyber-Security-Business-Techn-187837759-150x98.jpg 150w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/7-tips-improve-your-small-business-cybersecurity/" class="_self" target="_self" >7 Tips to Improve Your Small Business Cybersecurity</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/gdpr-countdown-how-facebook-other-companies-are-bracing-for-regulatory-impact/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2018/03/bigstock-220867267-300x200.jpg" class="pt-cv-thumbnail" alt="General Data Protection Regulation images, GDPR, EU, right to be forgotten" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2018/03/bigstock-220867267-300x200.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2018/03/bigstock-220867267-768x512.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2018/03/bigstock-220867267-1024x683.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2018/03/bigstock-220867267-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2018/03/bigstock-220867267-272x182.jpg 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/gdpr-countdown-how-facebook-other-companies-are-bracing-for-regulatory-impact/" class="_self" target="_self" >GDPR Countdown: How Facebook &#038; Other Companies are Bracing for Regulatory Impact</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/think-your-business-is-too-small-for-a-cyber-attack-think-again/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="205" src="https://innovationatwork.ieee.org/wp-content/uploads/2018/03/bigstock-215400454-300x205.jpg" class="pt-cv-thumbnail" alt="small to medium size cyber security cyber threats cyber attacks SME" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2018/03/bigstock-215400454-300x205.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2018/03/bigstock-215400454-768x524.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2018/03/bigstock-215400454-1024x698.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2018/03/bigstock-215400454-150x102.jpg 150w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/think-your-business-is-too-small-for-a-cyber-attack-think-again/" class="_self" target="_self" >Think Your Business Is Too Small for a Cyber Attack? Think Again</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/cyber-security-questions-every-business-should-be-asking/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/09/bigstock-Online-Secure-Connection-81967397-300x200.jpg" class="pt-cv-thumbnail" alt="Cyber Security Questions Every Business Should Be Asking" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/09/bigstock-Online-Secure-Connection-81967397-300x200.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2017/09/bigstock-Online-Secure-Connection-81967397-768x512.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/09/bigstock-Online-Secure-Connection-81967397-1024x683.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2017/09/bigstock-Online-Secure-Connection-81967397-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2017/09/bigstock-Online-Secure-Connection-81967397-272x182.jpg 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/cyber-security-questions-every-business-should-be-asking/" class="_self" target="_self" >Cyber Security Questions Every Business Should Be Asking</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/gdpr-readiness-gap-survey-finds-companies-overconfident-underprepared/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2018/01/bigstock-222697246-300x200.jpg" class="pt-cv-thumbnail" alt="GDPR Compliance 2018 IEEE" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2018/01/bigstock-222697246-300x200.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2018/01/bigstock-222697246-768x512.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2018/01/bigstock-222697246-1024x683.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2018/01/bigstock-222697246-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2018/01/bigstock-222697246-272x182.jpg 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/gdpr-readiness-gap-survey-finds-companies-overconfident-underprepared/" class="_self" target="_self" >GDPR Readiness Gap: Survey Finds Companies Overconfident &#038; Underprepared</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/ces-2018-news-to-know-about/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="201" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/12/bigstock-138633494-300x201.jpg" class="pt-cv-thumbnail" alt="CES 2018 Updates from IEEE" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/12/bigstock-138633494-300x201.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2017/12/bigstock-138633494-768x514.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/12/bigstock-138633494-1024x685.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2017/12/bigstock-138633494-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2017/12/bigstock-138633494-272x182.jpg 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/ces-2018-news-to-know-about/" class="_self" target="_self" >CES 2018: News To Know About</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/four-core-eiot-security-threats/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="188" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/12/bigstock-145831646-300x188.jpg" class="pt-cv-thumbnail" alt="bring your own device business IT security" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/12/bigstock-145831646-300x188.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2017/12/bigstock-145831646-768x481.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/12/bigstock-145831646-1024x641.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2017/12/bigstock-145831646-150x94.jpg 150w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/four-core-eiot-security-threats/" class="_self" target="_self" >Enterprise Internet of Things: Four Core Security Threats</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/top-ieee-innovation-at-work-articles-2017/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/03/bigstock-Working-at-home-with-laptop-wo-116397752-300x200.jpg" class="pt-cv-thumbnail" alt="IEEE Innovation at Work" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/03/bigstock-Working-at-home-with-laptop-wo-116397752-300x200.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2017/03/bigstock-Working-at-home-with-laptop-wo-116397752-768x513.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/03/bigstock-Working-at-home-with-laptop-wo-116397752-1024x683.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2017/03/bigstock-Working-at-home-with-laptop-wo-116397752-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2017/03/bigstock-Working-at-home-with-laptop-wo-116397752-272x182.jpg 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/top-ieee-innovation-at-work-articles-2017/" class="_self" target="_self" >Top 5 IEEE Innovation at Work Articles of 2017</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/cyber-security-stats-mean-cyber-security-training-needed/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="225" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/12/bigstock-203579284-300x225.jpg" class="pt-cv-thumbnail" alt="Cyber security training from IEEE" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/12/bigstock-203579284-300x225.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2017/12/bigstock-203579284-768x576.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/12/bigstock-203579284-1024x768.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2017/12/bigstock-203579284-150x113.jpg 150w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/cyber-security-stats-mean-cyber-security-training-needed/" class="_self" target="_self" >The Latest Worrisome Cyber Security Stats</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/gdpr-cyber-security/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="146" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/11/bigstock-data-privacy-187654582-300x146.jpg" class="pt-cv-thumbnail" alt="GDPR cyber security" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/11/bigstock-data-privacy-187654582-300x146.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2017/11/bigstock-data-privacy-187654582-768x374.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/11/bigstock-data-privacy-187654582-1024x499.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2017/11/bigstock-data-privacy-187654582-150x73.jpg 150w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/gdpr-cyber-security/" class="_self" target="_self" >GDPR will Help Enhance Cyber Security</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/smart-device-spying/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/11/bigstock-A-Portrait-Of-Little-Boy-In-Re-182841493-300x200.jpg" class="pt-cv-thumbnail" alt="Is your smart device spying on you?" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/11/bigstock-A-Portrait-Of-Little-Boy-In-Re-182841493-300x200.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2017/11/bigstock-A-Portrait-Of-Little-Boy-In-Re-182841493-768x512.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/11/bigstock-A-Portrait-Of-Little-Boy-In-Re-182841493-1024x683.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2017/11/bigstock-A-Portrait-Of-Little-Boy-In-Re-182841493-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2017/11/bigstock-A-Portrait-Of-Little-Boy-In-Re-182841493-272x182.jpg 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/smart-device-spying/" class="_self" target="_self" >Is Your Smart Device Spying On You?</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/iot-edge-computing/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/11/bigstock-robotic-machine-tool-in-indust-198876664-300x200.jpg" class="pt-cv-thumbnail" alt="edge computing internet of things (IoT)" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/11/bigstock-robotic-machine-tool-in-indust-198876664-300x200.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2017/11/bigstock-robotic-machine-tool-in-indust-198876664-768x513.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/11/bigstock-robotic-machine-tool-in-indust-198876664-1024x683.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2017/11/bigstock-robotic-machine-tool-in-indust-198876664-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2017/11/bigstock-robotic-machine-tool-in-indust-198876664-272x182.jpg 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/iot-edge-computing/" class="_self" target="_self" >Managing IoT on the Edge</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/cyber-security-talent-shortage/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/11/bigstock-cyber-security-woman-200306023-300x200.jpg" class="pt-cv-thumbnail" alt="Solving Cyber Security Talent Shortage" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/11/bigstock-cyber-security-woman-200306023-300x200.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2017/11/bigstock-cyber-security-woman-200306023-768x512.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/11/bigstock-cyber-security-woman-200306023-1024x683.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2017/11/bigstock-cyber-security-woman-200306023-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2017/11/bigstock-cyber-security-woman-200306023-272x182.jpg 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/cyber-security-talent-shortage/" class="_self" target="_self" >Cyber Security Talent Shortage: How to Solve It</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/iot-needs-artificial-intelligence/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="169" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/10/bigstock-185933284-smart-home-artificial-intelligence-Converted-1-300x169.jpg" class="pt-cv-thumbnail" alt="The IoT Needs Artificial Intelligence" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/10/bigstock-185933284-smart-home-artificial-intelligence-Converted-1-300x169.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2017/10/bigstock-185933284-smart-home-artificial-intelligence-Converted-1-768x433.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/10/bigstock-185933284-smart-home-artificial-intelligence-Converted-1-1024x577.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2017/10/bigstock-185933284-smart-home-artificial-intelligence-Converted-1-150x84.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2017/10/bigstock-185933284-smart-home-artificial-intelligence-Converted-1.jpg 1058w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/iot-needs-artificial-intelligence/" class="_self" target="_self" >The IoT Needs Artificial Intelligence</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/should-government-regulate-iot/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/10/bigstock-business-technology-communic-117844676-300x200.jpg" class="pt-cv-thumbnail" alt="Should the government regulate IoT devices?" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/10/bigstock-business-technology-communic-117844676-300x200.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2017/10/bigstock-business-technology-communic-117844676-768x512.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/10/bigstock-business-technology-communic-117844676-1024x683.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2017/10/bigstock-business-technology-communic-117844676-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2017/10/bigstock-business-technology-communic-117844676-272x182.jpg 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/should-government-regulate-iot/" class="_self" target="_self" >Should the Government Regulate IoT Devices?</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/corporate-hacking-target/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="259" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/10/bigstock-Cyber-attack-concept-in-word-t-29231093-300x259.jpg" class="pt-cv-thumbnail" alt="Corporate Hacking: Are you a target?" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/10/bigstock-Cyber-attack-concept-in-word-t-29231093-300x259.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2017/10/bigstock-Cyber-attack-concept-in-word-t-29231093-768x663.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/10/bigstock-Cyber-attack-concept-in-word-t-29231093-1024x884.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2017/10/bigstock-Cyber-attack-concept-in-word-t-29231093-150x130.jpg 150w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/corporate-hacking-target/" class="_self" target="_self" >Corporate Hacking: Are You a Target?</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/cyber-security-awareness-month/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="296" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/10/bigstock-Cybersecurity-Safety-Internet-44231350-300x296.jpg" class="pt-cv-thumbnail" alt="Are you #CyberAware? Cyber Security Awareness Month" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/10/bigstock-Cybersecurity-Safety-Internet-44231350-300x296.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2017/10/bigstock-Cybersecurity-Safety-Internet-44231350-768x758.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/10/bigstock-Cybersecurity-Safety-Internet-44231350-1024x1011.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2017/10/bigstock-Cybersecurity-Safety-Internet-44231350-150x148.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2017/10/bigstock-Cybersecurity-Safety-Internet-44231350-50x50.jpg 50w, https://innovationatwork.ieee.org/wp-content/uploads/2017/10/bigstock-Cybersecurity-Safety-Internet-44231350-45x45.jpg 45w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/cyber-security-awareness-month/" class="_self" target="_self" >Tips for Cyber Security Awareness Month</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/medical-device-cyber-security/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/09/bigstock-182919151-300x200.jpg" class="pt-cv-thumbnail" alt="medical device cyber security" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/09/bigstock-182919151-300x200.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2017/09/bigstock-182919151-768x513.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/09/bigstock-182919151-1024x683.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2017/09/bigstock-182919151-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2017/09/bigstock-182919151-272x182.jpg 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/medical-device-cyber-security/" class="_self" target="_self" >Medical Device Cyber Security is Essential</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/10-largest-corporate-hacks-recent-history/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="232" height="300" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/09/IAW-Article-1_10-of-the-Largest-Corporate-Hacks-in-History-Infographic_14Sept2017-1-232x300.jpg" class="pt-cv-thumbnail" alt="10 of the Largest Corporate Hacks in History Infographic" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/09/IAW-Article-1_10-of-the-Largest-Corporate-Hacks-in-History-Infographic_14Sept2017-1-232x300.jpg 232w, https://innovationatwork.ieee.org/wp-content/uploads/2017/09/IAW-Article-1_10-of-the-Largest-Corporate-Hacks-in-History-Infographic_14Sept2017-1-150x194.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2017/09/IAW-Article-1_10-of-the-Largest-Corporate-Hacks-in-History-Infographic_14Sept2017-1.jpg 672w" sizes="(max-width: 232px) 100vw, 232px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/10-largest-corporate-hacks-recent-history/" class="_self" target="_self" >10 of the Largest Corporate Hacks in Recent History</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/easy-ways-improve-cyber-security/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="219" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/09/bigstock-Futuristic-integrated-circuit-56086169-300x219.jpg" class="pt-cv-thumbnail" alt="Easy Ways to Improve Cyber Security from IEEE" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/09/bigstock-Futuristic-integrated-circuit-56086169-300x219.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2017/09/bigstock-Futuristic-integrated-circuit-56086169-768x561.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/09/bigstock-Futuristic-integrated-circuit-56086169-1024x748.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2017/09/bigstock-Futuristic-integrated-circuit-56086169-150x110.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2017/09/bigstock-Futuristic-integrated-circuit-56086169.jpg 1600w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/easy-ways-improve-cyber-security/" class="_self" target="_self" >Easy Ways to Improve Your Organization&#8217;s Cyber Security</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/most-organizations-unprepared-for-cyber-attack/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/09/bigstock-183765721-300x200.jpg" class="pt-cv-thumbnail" alt="Study Reveals Most Organizations Are Unprepared for Cyber Attack" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/09/bigstock-183765721-300x200.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2017/09/bigstock-183765721-768x512.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/09/bigstock-183765721-1024x683.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2017/09/bigstock-183765721-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2017/09/bigstock-183765721-272x182.jpg 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/most-organizations-unprepared-for-cyber-attack/" class="_self" target="_self" >Study Reveals Most Organizations Are Unprepared for Cyber Attack</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/continuing-professional-education-greater-roi/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="232" height="300" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/09/17-EA-319-Infographic2_FocusonBusinessGrowthandSuccess_Final-232x300.jpg" class="pt-cv-thumbnail" alt="IEEE Continuing Professional Education brings ROI to organizations" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/09/17-EA-319-Infographic2_FocusonBusinessGrowthandSuccess_Final-232x300.jpg 232w, https://innovationatwork.ieee.org/wp-content/uploads/2017/09/17-EA-319-Infographic2_FocusonBusinessGrowthandSuccess_Final-768x994.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/09/17-EA-319-Infographic2_FocusonBusinessGrowthandSuccess_Final-791x1024.jpg 791w, https://innovationatwork.ieee.org/wp-content/uploads/2017/09/17-EA-319-Infographic2_FocusonBusinessGrowthandSuccess_Final-150x194.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2017/09/17-EA-319-Infographic2_FocusonBusinessGrowthandSuccess_Final.jpg 1836w" sizes="(max-width: 232px) 100vw, 232px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/continuing-professional-education-greater-roi/" class="_self" target="_self" >Continuing Professional Education Leads to Greater ROI for Companies</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/ethical-hacking-infographic/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="81" height="300" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/07/a-day-in-the-li_23491314_ad1d848670e33bc638f3a199d70f0f5c54283d8b-81x300.png" class="pt-cv-thumbnail" alt="IEEE Ethical Hacking Infographic: A Day in the Life of an Ethical Hacker" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/07/a-day-in-the-li_23491314_ad1d848670e33bc638f3a199d70f0f5c54283d8b-81x300.png 81w, https://innovationatwork.ieee.org/wp-content/uploads/2017/07/a-day-in-the-li_23491314_ad1d848670e33bc638f3a199d70f0f5c54283d8b-768x2852.png 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/07/a-day-in-the-li_23491314_ad1d848670e33bc638f3a199d70f0f5c54283d8b-276x1024.png 276w, https://innovationatwork.ieee.org/wp-content/uploads/2017/07/a-day-in-the-li_23491314_ad1d848670e33bc638f3a199d70f0f5c54283d8b-150x557.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2017/07/a-day-in-the-li_23491314_ad1d848670e33bc638f3a199d70f0f5c54283d8b.png 1274w" sizes="(max-width: 81px) 100vw, 81px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/ethical-hacking-infographic/" class="_self" target="_self" >Ethical Hacking Infographic: A Day in the Life of an Ethical Hacker</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/physical-cyber-security-defenses/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="169" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/07/bigstock-151269635-300x169.jpg" class="pt-cv-thumbnail" alt="When It Comes to Cyber Security, Consider Physical Cyber Security Defenses from IEEE Innovation at Work" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/07/bigstock-151269635-300x169.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2017/07/bigstock-151269635-768x432.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/07/bigstock-151269635-1024x576.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2017/07/bigstock-151269635-150x84.jpg 150w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/physical-cyber-security-defenses/" class="_self" target="_self" >When It Comes to Cyber Security, Consider Physical Cyber Security Defenses</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/the-prescription-healthcare-needs-now-stronger-cyber-security/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/07/bigstock-Laptop-with-medical-diagnostic-81504332-300x200.jpg" class="pt-cv-thumbnail" alt="Protecting Medical Devices from Cyber Criminals" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/07/bigstock-Laptop-with-medical-diagnostic-81504332-300x200.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2017/07/bigstock-Laptop-with-medical-diagnostic-81504332-768x512.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/07/bigstock-Laptop-with-medical-diagnostic-81504332-1024x683.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2017/07/bigstock-Laptop-with-medical-diagnostic-81504332-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2017/07/bigstock-Laptop-with-medical-diagnostic-81504332-272x182.jpg 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/the-prescription-healthcare-needs-now-stronger-cyber-security/" class="_self" target="_self" >The Prescription Healthcare Needs Now: Stronger Cyber Security</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/five-lessons-learned-from-recent-cyber-attacks/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="259" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/07/bigstock-Cyber-Attack-Hacker-Publishing-126554348-300x259.jpg" class="pt-cv-thumbnail" alt="5 Lessons Learned from Recent Cyber Attacks" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/07/bigstock-Cyber-Attack-Hacker-Publishing-126554348-300x259.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2017/07/bigstock-Cyber-Attack-Hacker-Publishing-126554348-768x663.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/07/bigstock-Cyber-Attack-Hacker-Publishing-126554348-1024x884.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2017/07/bigstock-Cyber-Attack-Hacker-Publishing-126554348-150x130.jpg 150w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/five-lessons-learned-from-recent-cyber-attacks/" class="_self" target="_self" >Five Lessons Learned from Recent Cyber Attacks</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/electric-grid-malware-attack/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-Power-Lines-81840407-300x200.jpg" class="pt-cv-thumbnail" alt="An Electric Grid Malware Attack must be prepared for, and defended against. New article from IEEE Educational Activities" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-Power-Lines-81840407-300x200.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-Power-Lines-81840407-768x512.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-Power-Lines-81840407-1024x683.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-Power-Lines-81840407-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-Power-Lines-81840407-272x182.jpg 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/electric-grid-malware-attack/" class="_self" target="_self" >Is Your Community&#8217;s Electric Grid Prepared for a Malware Attack?</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/latin-america-is-under-cyber-attack/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="132" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-Latin-America-Economy-46002829-300x132.jpg" class="pt-cv-thumbnail" alt="Three Reasons why Latin America is under Cyber Attack from IEEE Innovation at Work" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-Latin-America-Economy-46002829-300x132.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-Latin-America-Economy-46002829-768x338.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-Latin-America-Economy-46002829-1024x451.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-Latin-America-Economy-46002829-150x66.jpg 150w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/latin-america-is-under-cyber-attack/" class="_self" target="_self" >Three Reasons Why Latin America is Under Cyber Attack</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/cyber-threats-in-social-media/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="199" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-173075456-300x199.jpg" class="pt-cv-thumbnail" alt="Cyber Threats Lurking in Social Media from IEEE Educational Activities" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-173075456-300x199.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-173075456-768x510.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-173075456-1024x680.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-173075456-150x100.jpg 150w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/cyber-threats-in-social-media/" class="_self" target="_self" >The Cyber Threats Lurking in Social Media</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/cyber-security-cyber-attack/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="180" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-Business-Technology-Internet-176384791-300x180.jpg" class="pt-cv-thumbnail" alt="Learn how to defend against cyber attack with cyber security training from IEEE" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-Business-Technology-Internet-176384791-300x180.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-Business-Technology-Internet-176384791-768x461.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-Business-Technology-Internet-176384791-1024x615.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-Business-Technology-Internet-176384791-150x90.jpg 150w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/cyber-security-cyber-attack/" class="_self" target="_self" >Three Reasons Why Organizations Don&#8217;t Take Cyber Security Seriously Enough</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/how-strengthen-cyber-security/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-Cyber-Security-Business-Techn-181197448-300x200.jpg" class="pt-cv-thumbnail" alt="Strengthen cyber security for your organization with cyber security training from IEEE" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-Cyber-Security-Business-Techn-181197448-300x200.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-Cyber-Security-Business-Techn-181197448-768x512.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-Cyber-Security-Business-Techn-181197448-1024x683.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-Cyber-Security-Business-Techn-181197448-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-Cyber-Security-Business-Techn-181197448-272x182.jpg 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/how-strengthen-cyber-security/" class="_self" target="_self" >How to Strengthen Your Organization’s Cyber Security</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/engineers-easy-targets-cyber-criminals/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-157700702-300x200.jpg" class="pt-cv-thumbnail" alt="Are Engineers Easy Targets for Cyber Criminals? from IEEE Innovation at Work" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-157700702-300x200.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-157700702-768x512.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-157700702-1024x683.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-157700702-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2017/06/bigstock-157700702-272x182.jpg 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/engineers-easy-targets-cyber-criminals/" class="_self" target="_self" >Are Engineers Easy Targets for Cyber Criminals?</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/securing-internet-things-cyber-attack-critical/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="146" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/05/bigstock-183364126-300x146.jpg" class="pt-cv-thumbnail" alt="Securing the Internet of Things is Critical" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/05/bigstock-183364126-300x146.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2017/05/bigstock-183364126-768x374.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/05/bigstock-183364126-1024x499.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2017/05/bigstock-183364126-150x73.jpg 150w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/securing-internet-things-cyber-attack-critical/" class="_self" target="_self" >Securing the Internet of Things from Cyber Attack is Critical</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/cyber-security-threats-infographic/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="104" height="300" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/04/ieee-cybersecurity-infographic-104x300.jpg" class="pt-cv-thumbnail" alt="IEEE Cybersecurity Infographic" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/04/ieee-cybersecurity-infographic-104x300.jpg 104w, https://innovationatwork.ieee.org/wp-content/uploads/2017/04/ieee-cybersecurity-infographic-768x2223.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/04/ieee-cybersecurity-infographic-354x1024.jpg 354w, https://innovationatwork.ieee.org/wp-content/uploads/2017/04/ieee-cybersecurity-infographic-150x434.jpg 150w" sizes="(max-width: 104px) 100vw, 104px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/cyber-security-threats-infographic/" class="_self" target="_self" >Infographic: Cyber Security Threats</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/avoiding-top-10-security-design-flaws/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="291" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/04/avoiding-cyber-security-flaws-300x291.png" class="pt-cv-thumbnail" alt="Avoiding the Top 10 Security Design Flaws" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/04/avoiding-cyber-security-flaws-300x291.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2017/04/avoiding-cyber-security-flaws-150x146.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2017/04/avoiding-cyber-security-flaws-50x50.png 50w, https://innovationatwork.ieee.org/wp-content/uploads/2017/04/avoiding-cyber-security-flaws-45x45.png 45w, https://innovationatwork.ieee.org/wp-content/uploads/2017/04/avoiding-cyber-security-flaws.png 685w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/avoiding-top-10-security-design-flaws/" class="_self" target="_self" >Avoiding the Top 10 Security Design Flaws</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/cyber-security-vulnerability-navigator/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="169" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/04/Cybersecurity-vulnerability-navigator-300x169.jpg" class="pt-cv-thumbnail" alt="IEEE Cyber Security: Cyber Security Vulnerability Navigator" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/04/Cybersecurity-vulnerability-navigator-300x169.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2017/04/Cybersecurity-vulnerability-navigator-768x432.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/04/Cybersecurity-vulnerability-navigator-150x84.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2017/04/Cybersecurity-vulnerability-navigator.jpg 777w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/cyber-security-vulnerability-navigator/" class="_self" target="_self" >Cyber Security Vulnerability Navigator</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/try-hand-defeating-cyber-attacks/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="300" height="200" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/03/bigstock-Working-at-home-with-laptop-wo-116397752-300x200.jpg" class="pt-cv-thumbnail" alt="IEEE Innovation at Work" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/03/bigstock-Working-at-home-with-laptop-wo-116397752-300x200.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2017/03/bigstock-Working-at-home-with-laptop-wo-116397752-768x513.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2017/03/bigstock-Working-at-home-with-laptop-wo-116397752-1024x683.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2017/03/bigstock-Working-at-home-with-laptop-wo-116397752-150x100.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2017/03/bigstock-Working-at-home-with-laptop-wo-116397752-272x182.jpg 272w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/try-hand-defeating-cyber-attacks/" class="_self" target="_self" >Try Your Hand at Defeating Cyber Attacks</a></h4> </div> </div> <div class="col-md-6 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col" > <div class='pt-cv-ifield'><a href="https://innovationatwork.ieee.org/infographic-cyber-security-demand-workforce/" class="_self pt-cv-href-thumbnail pt-cv-thumb-default" target="_self" ><img loading="lazy" decoding="async" width="201" height="300" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/03/eLL-CS-EH_Infographic-1_600x900-201x300.jpg" class="pt-cv-thumbnail" alt="" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/03/eLL-CS-EH_Infographic-1_600x900-201x300.jpg 201w, https://innovationatwork.ieee.org/wp-content/uploads/2017/03/eLL-CS-EH_Infographic-1_600x900-150x224.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2017/03/eLL-CS-EH_Infographic-1_600x900.jpg 466w" sizes="(max-width: 201px) 100vw, 201px" /></a></p> <h4 class="pt-cv-title"><a href="https://innovationatwork.ieee.org/infographic-cyber-security-demand-workforce/" class="_self" target="_self" >Infographic: The Increasing Demand for Cyber Security in the Workforce</a></h4> </div> </div> </div> </div> </div> </div> </div></div></div></div><div id="pg-982-3" class="panel-grid panel-no-style" ><div id="pgc-982-3-0" class="panel-grid-cell" ><div id="panel-982-3-0-0" class="so-panel widget_sow-editor panel-first-child panel-last-child" data-index="3" ><div class="so-widget-sow-editor so-widget-sow-editor-base" ><h3 class="widget-title">Cyber Security Training</h3> <div class="siteorigin-widget-tinymce textwidget"> </div> </div></div></div></div><div id="pg-982-4" class="panel-grid panel-no-style" ><div id="pgc-982-4-0" class="panel-grid-cell" ><div id="panel-982-4-0-0" class="so-panel widget_sow-image panel-first-child panel-last-child" data-index="4" ><div class="so-widget-sow-image so-widget-sow-image-default-8b5b6f678277-982" > <div class="sow-image-container"> <a href="http://bit.ly/2ohkHu3" > <img loading="lazy" decoding="async" src="https://innovationatwork.ieee.org/wp-content/uploads/2017/03/eLL-CS-EH-Combo_LinkedIn-Ad_300x250.jpg" width="300" height="251" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2017/03/eLL-CS-EH-Combo_LinkedIn-Ad_300x250.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2017/03/eLL-CS-EH-Combo_LinkedIn-Ad_300x250-150x126.jpg 150w" sizes="(max-width: 300px) 100vw, 300px" title="eLL CS &#038; EH Combo_LinkedIn Ad_300x250" alt="corporate cyber attacks cyber security safety ethical hacking internet of things corporate hacks" class="so-widget-image"/> </a></div> </div></div></div><div id="pgc-982-4-1" class="panel-grid-cell" ><div id="panel-982-4-1-0" class="so-panel widget_sow-editor panel-first-child panel-last-child" data-index="5" ><div class="so-widget-sow-editor so-widget-sow-editor-base" ><h3 class="widget-title">Cyber Security Tools for Today's Environment</h3> <div class="siteorigin-widget-tinymce textwidget"> <p>IEEE Continuing and Professional Education offers online training in the latest techniques in Cyber Security.</p> <ul> <li>Earn valuable CEUs and PDHs for your engineers</li> <li>Maximize your training budget. Train your entire organization for one low price.</li> </ul> <a href="http://bit.ly/2ohkY03" class="woo-sc-button custom" style="background:#e37222;border-color:#e37222"><span class="woo-">Learn More</span></a> </div> </div></div></div></div></div> </section><!-- /.entry --> <div class="fix"></div> </article><!-- /.post --> </section><!-- /#main --> <aside id="sidebar"> <aside id="connect" style="border:none; float:right;background:none;padding:0 82px 0 0;margin: -37px 0 0 0"> <div class="social" style="border:none;background:none;"> <a target="_blank" href="https://www.facebook.com/ieee.continuing.education/" class="facebook" title="Facebook"></a> <a target="_blank" href="https://twitter.com/IEEElearn" class="twitter" title="Twitter"></a> <a target="_blank" href="https://www.linkedin.com/company/ieee-educational-activities" class="linkedin" title="LinkedIn"></a> </div> <div class="fix"></div> </aside><div id="custom_html-4" class="widget_text widget widget_custom_html"><div class="textwidget custom-html-widget"></div></div><div id="text-27" class="widget widget_text"><h3>Subscribe to get the best articles, infographics, and course news delivered straight to your inbox.</h3> <div class="textwidget"><script src="//app-ab24.marketo.com/js/forms2/js/forms2.min.js"></script> <form id="mktoForm_1021"></form> <script>MktoForms2.loadForm("//app-ab24.marketo.com", "756-GPH-899", 1021);</script></div> </div><div id="text-44" class="widget widget_text"> <div class="textwidget"><p><a href="https://iln.ieee.org/Public/ContentDetails.aspx?id=BD52C464E276442DB1B42A2EC8F3EE52&amp;utm_source=iaw&amp;utm_medium=web_l_20240509&amp;utm_campaign=mg_PicsAd" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter wp-image-7326 size-full" src="https://innovationatwork.ieee.org/wp-content/uploads/2024/05/23-EA-3-912d-MiniGridsinAfricaWebAd-300x250-FNL.png" alt="" width="300" height="250" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2024/05/23-EA-3-912d-MiniGridsinAfricaWebAd-300x250-FNL.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2024/05/23-EA-3-912d-MiniGridsinAfricaWebAd-300x250-FNL-150x125.png 150w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> </div> </div><div id="text-5" class="widget widget_text"> <div class="textwidget"><p><a href="https://innovationatwork.ieee.org/certificates/?utm_source=IAW&amp;utm_medium=wb&amp;utm_campaign=PicsAd" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter wp-image-7373 size-full" src="https://innovationatwork.ieee.org/wp-content/uploads/2024/05/24-EA-3-902F-CredentialingAdSuite-WebAd-300x250-Attendance-FNL.jpg" alt="" width="300" height="250" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2024/05/24-EA-3-902F-CredentialingAdSuite-WebAd-300x250-Attendance-FNL.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2024/05/24-EA-3-902F-CredentialingAdSuite-WebAd-300x250-Attendance-FNL-150x125.jpg 150w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> </div> </div><div id="text-46" class="widget widget_text"> <div class="textwidget"><p><a href="https://forms1.ieee.org/IEEE-Rutgers-Mini-MBA-for-Engineers.html?LT=EA_WB_20230118_LM_ruminimba" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter wp-image-5763 size-full" src="https://innovationatwork.ieee.org/wp-content/uploads/2023/01/21-ea-362-rutgersminimba-businesstraining-webad-300x250-1.png" alt="IEEE-rutgers-mini-mba-for-engineers" width="300" height="250" data-wp-editing="1" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2023/01/21-ea-362-rutgersminimba-businesstraining-webad-300x250-1.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2023/01/21-ea-362-rutgersminimba-businesstraining-webad-300x250-1-150x125.png 150w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> </div> </div><div id="text-47" class="widget widget_text"> <div class="textwidget"><p><a href="https://iln.ieee.org/Public/ContentDetails.aspx?id=C61EB06931DD481E9FE74F2C17FD7D5E&amp;utm_source=iaw&amp;utm_medium=web_l_20220519&amp;utm_campaign=aero_PicsAd" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter wp-image-5363 size-medium" src="https://innovationatwork.ieee.org/wp-content/uploads/2022/05/21-EA-300-1a-IEEEStandardsAerospaceDefense-WebAd-418x350-Static-300x251.png" alt="" width="300" height="251" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2022/05/21-EA-300-1a-IEEEStandardsAerospaceDefense-WebAd-418x350-Static-300x251.png 300w, https://innovationatwork.ieee.org/wp-content/uploads/2022/05/21-EA-300-1a-IEEEStandardsAerospaceDefense-WebAd-418x350-Static-150x126.png 150w, https://innovationatwork.ieee.org/wp-content/uploads/2022/05/21-EA-300-1a-IEEEStandardsAerospaceDefense-WebAd-418x350-Static.png 418w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> </div> </div><div id="text-41" class="widget widget_text"> <div class="textwidget"><p><a href="https://iln.ieee.org/Public/ContentDetails.aspx?id=72F4692104C84E1FA1040ECD20E8B536&amp;utm_source=iaw&amp;utm_medium=web_l_20210411&amp;utm_campaign=ml_PicsAd"><img loading="lazy" decoding="async" class="aligncenter wp-image-4456 size-full" src="https://innovationatwork.ieee.org/wp-content/uploads/2021/04/20-EA-1.gif" alt="" width="300" height="250" /></a></p> </div> </div><div id="text-43" class="widget widget_text"> <div class="textwidget"><p><a href="https://iln.ieee.org/public/contentdetails.aspx?id=9D3FE9C6144F4C298ABDE18D84EDB93C&amp;utm_source=iaw&amp;utm_medium=web_l_20201209&amp;utm_campaign=ais_PicsAd"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-4216" src="https://innovationatwork.ieee.org/wp-content/uploads/2020/12/20-EA-363g-AIStandards-WebAd-300x250-Animated-FNL.gif" alt="" width="300" height="250" /></a></p> </div> </div><div id="text-37" class="widget widget_text"> <div class="textwidget"><p><a href="https://forms1.ieee.org/5G-Course-Program.html?LT=EA_WB_01.21.20_LM_IAW_5G_PicsAd"><img loading="lazy" decoding="async" class="aligncenter wp-image-3362 size-full" src="https://innovationatwork.ieee.org/wp-content/uploads/2020/01/19-EA-300-12B-5GCourse-WebAd-300x250-animated.gif" alt="5g-networks-course-ieee-nokia" width="300" height="250" /></a></p> </div> </div><div id="text-34" class="widget widget_text"> <div class="textwidget"><p><a href="https://forms1.ieee.org/Automotive-Cyber-Security.html?LT=EA_WB_02.22.21_LM_IAW_ACS_PicsAd"><img loading="lazy" decoding="async" class="aligncenter wp-image-4212 size-full" src="https://innovationatwork.ieee.org/wp-content/uploads/2020/12/20-EA-332C-AutomotiveCyberSecurityAd-FNL-300x250-Animated.gif" alt="" width="300" height="250" /></a></p> </div> </div><div id="text-40" class="widget widget_text"> <div class="textwidget"><p><a href="https://hkn.ieee.org/contact-headquarters?utm_source=IAW&amp;utm_medium=wb&amp;utm_campaign=PicsAd" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter wp-image-5564 size-medium" src="https://innovationatwork.ieee.org/wp-content/uploads/2022/10/22-EA-3-907E-AreYouHKN_2022-300x250-FNL-300x250.jpg" alt="are-you-eta-kappa-nu-hkn" width="300" height="250" srcset="https://innovationatwork.ieee.org/wp-content/uploads/2022/10/22-EA-3-907E-AreYouHKN_2022-300x250-FNL-300x250.jpg 300w, https://innovationatwork.ieee.org/wp-content/uploads/2022/10/22-EA-3-907E-AreYouHKN_2022-300x250-FNL-1024x854.jpg 1024w, https://innovationatwork.ieee.org/wp-content/uploads/2022/10/22-EA-3-907E-AreYouHKN_2022-300x250-FNL-768x640.jpg 768w, https://innovationatwork.ieee.org/wp-content/uploads/2022/10/22-EA-3-907E-AreYouHKN_2022-300x250-FNL-150x125.jpg 150w, https://innovationatwork.ieee.org/wp-content/uploads/2022/10/22-EA-3-907E-AreYouHKN_2022-300x250-FNL.jpg 1250w" sizes="(max-width: 300px) 100vw, 300px" /></a></p> </div> </div></aside><!-- /#sidebar --> </div><!-- /#main-sidebar-container --> </div><!-- /#content --> <script type="text/javascript"> _linkedin_data_partner_id = "45092"; </script><script type="text/javascript"> (function(){var s = document.getElementsByTagName("script")[0]; var b = document.createElement("script"); b.type = "text/javascript";b.async = true; b.src = "https://snap.licdn.com/li.lms-analytics/insight.min.js"; s.parentNode.insertBefore(b, s);})(); </script> <footer id="footer" class="col-full"> <a href="#top">TOP OF PAGE</a> <hr> <br> <a href="http://ieee-custom-ed-solutions.org/" id="u-home">Home</a> | <a href="https://innovationatwork.ieee.org/contact-us/" id="u-contact">Contact & Support</a> | <a href="http://www.ieee.org/accessibility_statement.html" id="u-accessibility">Accessibility</a> | <a href="http://www.ieee.org/p9-26.html" id="u-non">Nondiscrimination Policy</a> | <a href="http://ieee-ethics-reporting.org/" id="u-accessibility">IEEE Ethics Reporting</a> | <a href="http://www.ieee.org/security_privacy.html" id="u-privacy">Privacy & Opting Out of Cookies</a> <p><br>© Copyright <script>document.write(new Date().getFullYear())</script> IEEE – All rights reserved. Use of this website signifies your agreement to the <a href="http://www.ieee.org/site_terms_conditions.html">IEEE Terms and Conditions</a>. A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity.</p> <div id="copyright" class="col-left"> <p><p></p></p> </div> <div id="credit" class="col-right"> <p><p></p></p> </div> </footer> </div><!-- /#inner-wrapper --> </div><!-- /#wrapper --> <div class="fix"></div><!--/.fix--> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-M2GZK7M" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-KKPCDLN" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <script> ( function ( body ) { 'use strict'; body.className = body.className.replace( /\btribe-no-js\b/, 'tribe-js' ); } )( document.body ); </script> <script> (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','https://www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-93964949-1', 'auto'); ga('send', 'pageview'); </script> <!-- Google tag (gtag.js) --> <a href="https://www.googletagmanager.com/gtag/js?id=G-BSTL0YJSGF">https://www.googletagmanager.com/gtag/js?id=G-BSTL0YJSGF</a> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-BSTL0YJSGF'); </script> <script> /* <![CDATA[ */var tribe_l10n_datatables = {"aria":{"sort_ascending":": activate to sort column ascending","sort_descending":": activate to sort column descending"},"length_menu":"Show _MENU_ entries","empty_table":"No data available in table","info":"Showing _START_ to _END_ of _TOTAL_ entries","info_empty":"Showing 0 to 0 of 0 entries","info_filtered":"(filtered from _MAX_ total entries)","zero_records":"No matching records found","search":"Search:","all_selected_text":"All items on this page were selected. ","select_all_link":"Select all pages","clear_selection":"Clear Selection.","pagination":{"all":"All","next":"Next","previous":"Previous"},"select":{"rows":{"0":"","_":": Selected %d rows","1":": Selected 1 row"}},"datepicker":{"dayNames":["Sunday","Monday","Tuesday","Wednesday","Thursday","Friday","Saturday"],"dayNamesShort":["Sun","Mon","Tue","Wed","Thu","Fri","Sat"],"dayNamesMin":["S","M","T","W","T","F","S"],"monthNames":["January","February","March","April","May","June","July","August","September","October","November","December"],"monthNamesShort":["January","February","March","April","May","June","July","August","September","October","November","December"],"monthNamesMin":["Jan","Feb","Mar","Apr","May","Jun","Jul","Aug","Sep","Oct","Nov","Dec"],"nextText":"Next","prevText":"Prev","currentText":"Today","closeText":"Done","today":"Today","clear":"Clear"}};/* ]]> */ </script><link rel='stylesheet' id='sow-image-default-8b5b6f678277-982-css' href='https://innovationatwork.ieee.org/wp-content/uploads/siteorigin-widgets/sow-image-default-8b5b6f678277-982.css?ver=6.6.1' type='text/css' media='all' /> <script type="text/javascript" src="https://innovationatwork.ieee.org/wp-content/plugins/content-views-query-and-display-post-page/assets/ie-fix/html5shiv.min.js?ver=3.7.0" id="pt-cv-html5shiv-script-js"></script> <script type="text/javascript" src="https://innovationatwork.ieee.org/wp-content/plugins/content-views-query-and-display-post-page/assets/ie-fix/respond.js?ver=1.4.2" id="pt-cv-respond-script-js"></script> <script type="text/javascript" src="https://innovationatwork.ieee.org/wp-includes/js/dist/hooks.min.js?ver=2810c76e705dd1a53b18" id="wp-hooks-js"></script> <script type="text/javascript" src="https://innovationatwork.ieee.org/wp-includes/js/dist/i18n.min.js?ver=5e580eb46a90c2b997e6" id="wp-i18n-js"></script> <script type="text/javascript" id="wp-i18n-js-after"> /* <![CDATA[ */ wp.i18n.setLocaleData( { 'text direction\u0004ltr': [ 'ltr' ] } ); /* ]]> */ </script> <script type="text/javascript" src="https://innovationatwork.ieee.org/wp-content/plugins/contact-form-7/includes/swv/js/index.js?ver=6.0" id="swv-js"></script> <script type="text/javascript" id="contact-form-7-js-before"> /* <![CDATA[ */ var wpcf7 = { "api": { "root": "https:\/\/innovationatwork.ieee.org\/wp-json\/", "namespace": "contact-form-7\/v1" }, "cached": 1 }; /* ]]> */ </script> <script type="text/javascript" src="https://innovationatwork.ieee.org/wp-content/plugins/contact-form-7/includes/js/index.js?ver=6.0" id="contact-form-7-js"></script> <script type="text/javascript" id="pt-cv-content-views-script-js-extra"> /* <![CDATA[ */ var PT_CV_PUBLIC = {"_prefix":"pt-cv-","page_to_show":"5","_nonce":"c32c8cfdae","is_admin":"","is_mobile":"","ajaxurl":"https:\/\/innovationatwork.ieee.org\/wp-admin\/admin-ajax.php","lang":"","loading_image_src":"data:image\/gif;base64,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"}; var PT_CV_PAGINATION = {"first":"\u00ab","prev":"\u2039","next":"\u203a","last":"\u00bb","goto_first":"Go to first page","goto_prev":"Go to previous page","goto_next":"Go to next page","goto_last":"Go to last page","current_page":"Current page is","goto_page":"Go to page"}; /* ]]> */ </script> <script type="text/javascript" src="https://innovationatwork.ieee.org/wp-content/plugins/content-views-query-and-display-post-page/public/assets/js/cv.js?ver=4.0.2" id="pt-cv-content-views-script-js"></script> <script>document.body.className = document.body.className.replace("siteorigin-panels-before-js","");</script> <style> </style> <script> document.addEventListener("DOMContentLoaded", function(event) { }); </script> <script> var accordions_active = null; var accordions_tabs_active = null; </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10