Journal: Network Security

Volume 2020, Issue 10

6 -- 10Assaf Morag. Exploitable hosts used in cloud native cyber attacks
10 -- 13Nadav Erez. How threat actors abuse ICS-specific file types
13 -- 17Tom Hofmann. How organisations can ethically negotiate ransomware payments
17 -- 19Robert Meyers. Data highway and the digital transformation: arguments for secure, centralised log management
20 -- 0Colin Tankard. Remote working reset now required