Journal: Network Security

Volume 2015, Issue 1

5 -- 8Ben Densham. Three cyber-security strategies to mitigate the impact of a data breach
9 -- 12Ashish Patel. Network performance without compromising security
12 -- 14Guillermo Lafuente. The big data security challenge
14 -- 18Steve Mansfield-Devine. Managing identity for a competitive edge
18 -- 20Hongwen Zhang. Bring your own encryption: balancing security with practicality