Journal: Network Security

Volume 2013, Issue 9

5 -- 7Oscar Arean. Disaster recovery in the cloud
8 -- 12Tony Kenyon. The role of ADCs within secure application delivery
12 -- 15Dan Dunford. Managed file transfer: the next stage for data in motion?
15 -- 17Richard Hibbert. Calling time on compliance spreadsheet overload
17 -- 20Steve Mansfield-Devine. Interview: Jon Callas, Silent Circle

Volume 2013, Issue 8

5 -- 6John Thielens. Why APIs are central to a BYOD security strategy
7 -- 10Tom Gaffney. Following in the footsteps of Windows: how Android malware development is looking very familiar
11 -- 13Steve Mansfield-Devine. Interview: Mick Ebsworth - a matter of trust
14 -- 19Steve Gold. Subverting cellular technology: evolution, not revolution

Volume 2013, Issue 7

5 -- 8Tim Ring. IT's megatrends: the security impact
9 -- 12Danny Bradbury. Offensive defence
12 -- 15Patrick Scully. Under lock and key: protecting the network from attack
15 -- 18Norman Begg. Securely sharing access to sensitive data
18 -- 20Patrick Kerpan, Sam Mitchell. Bringing control to the business application layer

Volume 2013, Issue 6

5 -- 9Keith Barker. The security implications of IPv6
10 -- 13Steve Gold. Getting lost on the Internet: the problem with anonymity
14 -- 16Tim Brooks. Classic enterprise IT: the castle approach
16 -- 19Steve Mansfield-Devine. Q&A: Colin Tankard - raising security awareness

Volume 2013, Issue 5

5 -- 6Steve McGregory. Preparing for the next DDoS attack
6 -- 12Tracey Caldwell. Security at the data level
12 -- 14Jane Grafton. Avoiding the five pitfalls of privileged accounts
14 -- 18Steve Gold. Black Hat Europe: mobile attack vectors in the spotlight
18 -- 20Mark Hirst. Rack security and protection

Volume 2013, Issue 4

5 -- 11Richard Walters. Bringing IT out of the shadows
12 -- 13Brian Tokuyoshi. The security implications of BYOD
14 -- 18Tracey Caldwell. Identity - the new perimeter
18 -- 20Gary Newbold. Secure mobility in healthcare networks for optimal patient care

Volume 2013, Issue 3

5 -- 6Dan Pitt. Trust in the cloud: the role of SDN
7 -- 11Corey Nachreiner. Beat security auditors at their own game
12 -- 14Robert Winter. SSD vs HDD - data recovery and destruction
14 -- 17Peter Bassill. The holistic approach to security
17 -- 20Shannon Fehr. Flexible networks for better security

Volume 2013, Issue 2

5 -- 7Greg Jones. Penetrating the cloud
8 -- 9Mark Hirst. Securing your telemetry: making DCIM unsniffable
10 -- 12Marc Meulensteen. A smart grid must also be streetwise
13 -- 15Jane Goh. Moving security testing into the developer's domain
15 -- 18Steve Gold. Electronic countersurveillance strategies
19 -- 20Don Smith. Life's certainties: death, taxes and APTs

Volume 2013, Issue 12

5 -- 6Steve Johnson. Bringing IT out of the shadows
7 -- 9Shaun Hipgrave. Smarter fraud investigations with big data analytics
10 -- 11Marc Meulensteen. Critical infrastructure gets streetwise
12 -- 15Steve Mansfield-Devine. John Lyons, ICSPA: Resetting the clock on international co-operation
15 -- 18Steve Gold. Understanding the digital fingerprint
19 -- 20Tim Austwick. Using Oracle Apex securely

Volume 2013, Issue 11

5 -- 8Alistair Macrae. Identifying threats in real time
8 -- 11John Shaw. Dealing with encryption
12 -- 14Phil Allen. The importance of data protection inside your enterprise
15 -- 17E. J. Hilbert. Living with cybercrime
17 -- 20Steve Mansfield-Devine. Colin Tankard, Digital Pathways: confusion in the cloud

Volume 2013, Issue 10

5 -- 8Mike Small. From data breach to information stewardship
8 -- 12Sam Erdheim. Deployment and management with next-generation firewalls
12 -- 14Brian Chappell. Privilege management - the industry's best kept secret
14 -- 17Scott Baker. IP-based technology - the future of the security industry
18 -- 20Steve Mansfield-Devine. Interview: Seth Hallem, Mobile Helix - the right way to mobile security

Volume 2013, Issue 1

4 -- 0. Think Like a Programmer
4 -- 0. CUDA Programming
5 -- 7Danny Bradbury. Verifying software security - is it possible?
8 -- 11Thorsten Kurpjuhn. The evolving role of the UTM appliance
12 -- 14Jason Hart. Why the traditional approach to information security is no longer working
15 -- 18Wasim Ahmad Bhat, S. M. K. Quadri. Understanding and mitigating security issues in Sun NFS
18 -- 20Andrew Walker-Brown. Managing VPNs in the mobile worker's world