Journal: Network Security

Volume 2017, Issue 4

4 -- 0SM-D. Hiding Behind the Keyboard
5 -- 7Leon Adato. Monitoring and automation: it's easier than you think
7 -- 11Steve Mansfield-Devine. Fileless attacks: compromising targets without malware
12 -- 14Alan Zeichick. Enabling innovation by opening up the network
14 -- 17Rohit Talwar, April Koury. Artificial intelligence - the next frontier in IT security?
18 -- 19Mark Hickman. The threat from inside
20 -- 0Karen Renaud. Facts do not change minds