- Scott Dodds. When is the right time to outsource your security function?. Network Security, 2021(5):16-19, 2021.
- Reinhardt A. Botha, Steven Furnell. Facing up to security and privacy in online meetings. Network Security, 2021(5):7-13, 2021.
- Rob Allen. Reducing the security risks of USB devices. Network Security, 2021(9):17-19, 2021.
- Chad Anderson, John 'Turbo' Conwell, Tarik Saleh. Investigating cyber attacks using domain and DNS data. Network Security, 2021(3):6-8, 2021.
- Kingsley Hayes. Ransomware: a growing geopolitical threat. Network Security, 2021(8):11-13, 2021.
- Daniel Gibson. IoT law and order. Network Security, 2021(8):20, 2021.
- Marc Lueck. The seven myths of encrypted traffic scanning. Network Security, 2021(7):9-12, 2021.
- Altaz Valani. A multi-pronged approach to effective application security. Network Security, 2021(8):18-19, 2021.
- Sivaraman Eswaran, Aruna Srinivasan, Prasad Honnavalli. A threshold-based, real-time analysis in early detection of endpoint anomalies using SIEM expertise. Network Security, 2021(4):7-16, 2021.
- Duncan Godfrey. Layering identity and access management to disrupt attacks. Network Security, 2021(11):17-19, 2021.