-
Topics Cloud - Click To Browse
Electronics Environment Europe NanoTechnology Pesticides Pollution Research Rivers About Us (1)
Artificial Intelligence (3)
Arts & Literature (4)
Aviation (5)
Business (61)
Cyber Security (68)
Economy (107)
Energy (28)
Environment (14)
Featured (205)
Geopolitics (194)
Innovation (151)
Intelligence (25)
Military (82)
Mobility (34)
Movies (1)
NanoTechnology (9)
News (92)
Politics (121)
Risk (67)
Science (57)
Security (34)
Society (34)
Space (17)
Spotlight (300)
Technology (228)
Uncategorized (3)
WP Cumulus Flash tag cloud by Roy Tanck and Luke Morton requires Flash Player 9 or better.
-
Popular Posts
- It’s Alive: Latest Earthquakes in the World – Past 7 days from the USGS 14,766 views
- Self-sufficiency: The Politics of Iran’s Space Program 14,519 views
- Career Management: The most demanded Jobs in the next 20 years 13,676 views
- Engineering: Tokyo’s Skycrapers Moved but didn’t Collapse 12,328 views
- Stealth: A Modified Boeing-Sikorsky UH-60 Comanche? 11,564 views
- Apple: Designed in California – Assembled in China 11,448 views
- Interactive Map: Scientists Project Path of Radiation Plume 10,928 views
- US Air Force: The Quest for a Sixth Generation Fighter 10,631 views
- Mail Online: The Japanese road repaired SIX days after it was destroyed by quake 10,413 views
- NYT: Why We Travel or the Quest of the Self in Today’s World Turmoil 9,889 views
- GE Global 2012 Innovation Barometer: Between Perception and Reality 9,878 views
The Economist Daily Chart
Risk Archive
-
Crypto vs Quantum = Post-Quantum CRYPTOgraphyfor long-term security
Cordis: “When quantum computers become available, an existing algorithm will challenge current encryption techniques now considered secure. Work being done... -
Baldrige: NIST Unveils a Cybersecurity Self-Assessment Tool
The The U.S. Commerce Department’s National Institute of Standards and Technology (NIST) unveiled a first draft of a security self-assessment tool... -
BYU: People disregard security warnings on computers because they come at bad times
BYU: ” A new study from BYU – Brigham Young University, in collaboration with Google Chrome engineers, finds the status quo... -
Digital: The Evolution of the Security Risk since a Decade
A recent paper by Professor Stephanie Forrest and Ph.D. student Benjamin Edwards from the Department of Computer Science at University of... -
ISN: Sony, the Internet of Things, and the Evolving Cyber-Threat
ISN: “Do recent cyber-attacks – including North Korea’s against Sony and a Stuxnet-style attack against a German steel works –... -
Side-Channels: The Cyber Risks of Off-Line Leaks
According to a research by a Georgia Tech team presented December 15 at the 47th Annual IEEE/ACM International Symposium on Microarchitecture in... -
The possibility: Could Hackers Change Our Election Results?
“Malicious hackers motivated by a desire to undermine the public’s confidence in the nation’s voting process could exploit both new... -
ISN: Oil and Gas by the Numbers
ISN: “The global energy market not only requires unrestricted access to proven oil and gas reserves, it also needs safe... -
The Fiscal Cliff: The Perspectives of a Second Dive
After the 2011 summer political debacle to raise the ceiling of the US debt, another potential risk is looming for... -
Roubini: My ‘Perfect Storm’ Is Unfolding Now
Wondering how long this economic crisis will last? Drawing down scenarios on who will first drag Europe into a banking...