Thesaurus / cyber
USE cyber IN A SENTENCE
Join our early testers! See how your sentence looks with different synonyms.
Roget's 21st Century Thesaurus, Third Edition Copyright © 2013 by the Philip Lief Group.
Quiz Yourself On You’re vs. Your!START THE QUIZ
EXAMPLE SENTENCES FROM THE WEB
The campaigns fit squarely into Iran’s cyber playbook, other researchers say.
RESEARCHERS FIND MORE VICTIMS OF ONE OF IRAN’S OLDEST HACKING GROUPSTONYA RILEYFEBRUARY 8, 2021WASHINGTON POST
Security teams can prepare by turning to defensive AI to fight back—using autonomous cyber defense that learns on the job to detect and respond to even the most subtle indicators of an attack, no matter where it appears.
Together with researchers in India, Mandl created “cyber watchdog” tools.
HOW TO FIGHT ONLINE HATE BEFORE IT LEADS TO VIOLENCEKATHIANN KOWALSKIFEBRUARY 4, 2021SCIENCE NEWS FOR STUDENTS
To be a responsible member of today’s increasingly digital society requires a new set of “cyber citizenship” skills.
WANT TO STOP THE NEXT CRISIS? TEACHING CYBER CITIZENSHIP MUST BECOME A NATIONAL PRIORITYMICHAEL MCCONNELLJANUARY 21, 2021TIME
Leo Simonovich, vice president and global head of industrial cyber and digital security at Siemens Energy, argues, “Oil and gas companies are becoming digital companies, and there shouldn’t be a trade-off between security and digitalization.”
At the time of writing a criminal investigation into the cyber attack remains ongoing.
EMA WARNS OVER DOCTORED COVID-19 VACCINE DATA HACKED AND LEAKED ONLINENATASHA LOMASJANUARY 15, 2021TECHCRUNCH
We’ve also got whole new fields of war opening up with state-sponsored cyber attacks, which can threaten the whole infrastructure of a state.
HUMANS HAVE GOTTEN NICER AND BETTER AT MAKING WAR - ISSUE 94: EVOLVINGSTEVE PAULSONJANUARY 6, 2021NAUTILUS
On Monday, the National Security Council convened an emergency meeting of agencies under a 2016 presidential order to address coordination on a “significant cyber event,” according to an official.
FEDERAL INVESTIGATORS FIND EVIDENCE OF PREVIOUSLY UNKNOWN TACTICS USED TO PENETRATE GOVERNMENT NETWORKSCRAIG TIMBERG, ELLEN NAKASHIMADECEMBER 17, 2020WASHINGTON POST
Samm Sacks is a cyber policy fellow at New America and a senior fellow at Yale Law School’s Paul Tsai China Center.
THE BALKANIZATION OF THE CLOUD IS BAD FOR EVERYONEAMY NORDRUMDECEMBER 17, 2020MIT TECHNOLOGY REVIEW