Journal: Network Security

Volume 2015, Issue 4

5 -- 10Peter Clay. A modern threat response framework
11 -- 12Mark Kedgley. If you can't stop the breach, at least spot the breach
13 -- 16Mike Auty. Anatomy of an advanced persistent threat
17 -- 18François Amigorena. Relevance is the key to users' security understanding
18 -- 20Phil Beckett. Getting your back-up data back up to date