Journal: Network Security

Volume 2014, Issue 9

5 -- 7Simon Saunders. Protecting against espionage
7 -- 9Phil Beckett. BYOD - popular and problematic
10 -- 12Julie Lockner. Do you know where your sensitive data is kept?
12 -- 16Steve Mansfield-Devine. Hacking on an industrial scale
17 -- 18Oded Gonda. Understanding the threat to SCADA networks
18 -- 20Lasse Andresen. Open sourcing the future of IAM

Volume 2014, Issue 8

5 -- 8Phil Bridge. EU puts pressure on businesses to erase data
8 -- 11Andrew Tang. A guide to penetration testing
11 -- 13Mark Lowe. Defending against cyber-criminals targeting business websites
14 -- 17Steve Mansfield-Devine. Not coping with change
17 -- 20Steve Watts. Intelligent combination - the benefits of tokenless two-factor authentication

Volume 2014, Issue 7

5 -- 9Jean-Yves Bisiaux. DNS threats and mitigation strategies
9 -- 12Allen Storey. There's nothing 'smart' about insecure connected devices
12 -- 16Patrick Bedwell. Finding a new approach to SIEM to suit the SME environment
16 -- 19Steve Mansfield-Devine. Building in security

Volume 2014, Issue 6

5 -- 8C. J. Radford. Challenges and solutions protecting data within Amazon Web Services
8 -- 12Danny Bradbury. Testing the defences of bulletproof hosting companies
12 -- 17Steve Gold. Challenges ahead on the digital forensics and audit trails
17 -- 20Chris Marrison. DNS as an attack vector - and how businesses can keep it secure

Volume 2014, Issue 5

5 -- 12Martin Maisey. Moving to analysis-led cyber-security
12 -- 15Mark Southam. DNSSEC: What it is and why it matters
16 -- 17Jon Inns. The evolution and application of SIEM systems
18 -- 20Sonia Blizzard. Don't feed the hackers: how your attitude to data security could affect business

Volume 2014, Issue 4

5 -- 9Ross Brewer. Advanced persistent threats: minimising the damage
9 -- 14Harry Sverdlove. The Java vulnerability landscape
14 -- 17Danny Bradbury. Unveiling the dark web
18 -- 20Keith Bird. Sandboxing: a line in the sand against malware

Volume 2014, Issue 3

5 -- 8Tracey Caldwell. Call the digital fire brigade
9 -- 11Pat Barnes. Using DNS to protect networks from threats within
12 -- 13Daniƫlle van Leeuwen. Bring your own software
13 -- 16Danny Bradbury. Can we make email secure?
17 -- 18Florian Malecki. The cost of network-based attacks
18 -- 20Mike Keightley. The looming XP disaster in industrial environments

Volume 2014, Issue 2

5 -- 8Mark Kedgley. File integrity monitoring in the modern threat landscape
8 -- 10Peter Heim. The quest for clarity on data protection and security
11 -- 12Stephen Allen. Medical device software under the microscope
12 -- 15Hongwen Zhang. A vision for cloud security
15 -- 20Steve Gold. In search of a new perimeter

Volume 2014, Issue 12

5 -- 6David Tipping. The rising threats from Voice over IP
7 -- 13Gursev Singh Kalra. Threat analysis of an enterprise messaging system
13 -- 15Robert Jones, Tony Dearsley. Time for a data detox
16 -- 17Joe Goldberg. Tackling unknown threats
18 -- 20Ashley Lane. Cross domain solutions - and why they matter

Volume 2014, Issue 11

5 -- 9Ken Munro. Android scraping: accessing personal data on mobile devices
9 -- 16Mark John Taylor, John Haggerty, David Gresty, Peter Almond, Tom Berry. Forensic investigation of social networking applications
16 -- 20Steve Mansfield-Devine. Mobile security: it's all about behaviour

Volume 2014, Issue 10

5 -- 7Jody Brazil. Security metrics to manage change
8 -- 10Alexandra Boldyreva, Paul Grubbs. Making encryption work in the cloud
10 -- 14Danny Bradbury. Anonymity and privacy: a guide for the perplexed
15 -- 17Paul Martini. A secure approach to wearable technology
17 -- 20Steve Mansfield-Devine. Masking sensitive data

Volume 2014, Issue 1

5 -- 7Steve Watts. Protecting your identity when working remotely
7 -- 9Barry Shteiman. Why CMS platforms are breeding security vulnerabilities
9 -- 11Mike Patterson. An index for network threat detection
11 -- 15Steve Mansfield-Devine. Interview: Corey Nachreiner, WatchGuard - security visibility
16 -- 17Richard Moulds. The global data protection conundrum
18 -- 19Conrad Constantine. Big data: an information security context