researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Network Security
Home
Index
Info
Volume
Volume
2014
, Issue
9
5
--
7
Simon Saunders
.
Protecting against espionage
7
--
9
Phil Beckett
.
BYOD - popular and problematic
10
--
12
Julie Lockner
.
Do you know where your sensitive data is kept?
12
--
16
Steve Mansfield-Devine
.
Hacking on an industrial scale
17
--
18
Oded Gonda
.
Understanding the threat to SCADA networks
18
--
20
Lasse Andresen
.
Open sourcing the future of IAM
Volume
2014
, Issue
8
5
--
8
Phil Bridge
.
EU puts pressure on businesses to erase data
8
--
11
Andrew Tang
.
A guide to penetration testing
11
--
13
Mark Lowe
.
Defending against cyber-criminals targeting business websites
14
--
17
Steve Mansfield-Devine
.
Not coping with change
17
--
20
Steve Watts
.
Intelligent combination - the benefits of tokenless two-factor authentication
Volume
2014
, Issue
7
5
--
9
Jean-Yves Bisiaux
.
DNS threats and mitigation strategies
9
--
12
Allen Storey
.
There's nothing 'smart' about insecure connected devices
12
--
16
Patrick Bedwell
.
Finding a new approach to SIEM to suit the SME environment
16
--
19
Steve Mansfield-Devine
.
Building in security
Volume
2014
, Issue
6
5
--
8
C. J. Radford
.
Challenges and solutions protecting data within Amazon Web Services
8
--
12
Danny Bradbury
.
Testing the defences of bulletproof hosting companies
12
--
17
Steve Gold
.
Challenges ahead on the digital forensics and audit trails
17
--
20
Chris Marrison
.
DNS as an attack vector - and how businesses can keep it secure
Volume
2014
, Issue
5
5
--
12
Martin Maisey
.
Moving to analysis-led cyber-security
12
--
15
Mark Southam
.
DNSSEC: What it is and why it matters
16
--
17
Jon Inns
.
The evolution and application of SIEM systems
18
--
20
Sonia Blizzard
.
Don't feed the hackers: how your attitude to data security could affect business
Volume
2014
, Issue
4
5
--
9
Ross Brewer
.
Advanced persistent threats: minimising the damage
9
--
14
Harry Sverdlove
.
The Java vulnerability landscape
14
--
17
Danny Bradbury
.
Unveiling the dark web
18
--
20
Keith Bird
.
Sandboxing: a line in the sand against malware
Volume
2014
, Issue
3
5
--
8
Tracey Caldwell
.
Call the digital fire brigade
9
--
11
Pat Barnes
.
Using DNS to protect networks from threats within
12
--
13
Daniƫlle van Leeuwen
.
Bring your own software
13
--
16
Danny Bradbury
.
Can we make email secure?
17
--
18
Florian Malecki
.
The cost of network-based attacks
18
--
20
Mike Keightley
.
The looming XP disaster in industrial environments
Volume
2014
, Issue
2
5
--
8
Mark Kedgley
.
File integrity monitoring in the modern threat landscape
8
--
10
Peter Heim
.
The quest for clarity on data protection and security
11
--
12
Stephen Allen
.
Medical device software under the microscope
12
--
15
Hongwen Zhang
.
A vision for cloud security
15
--
20
Steve Gold
.
In search of a new perimeter
Volume
2014
, Issue
12
5
--
6
David Tipping
.
The rising threats from Voice over IP
7
--
13
Gursev Singh Kalra
.
Threat analysis of an enterprise messaging system
13
--
15
Robert Jones
,
Tony Dearsley
.
Time for a data detox
16
--
17
Joe Goldberg
.
Tackling unknown threats
18
--
20
Ashley Lane
.
Cross domain solutions - and why they matter
Volume
2014
, Issue
11
5
--
9
Ken Munro
.
Android scraping: accessing personal data on mobile devices
9
--
16
Mark John Taylor
,
John Haggerty
,
David Gresty
,
Peter Almond
,
Tom Berry
.
Forensic investigation of social networking applications
16
--
20
Steve Mansfield-Devine
.
Mobile security: it's all about behaviour
Volume
2014
, Issue
10
5
--
7
Jody Brazil
.
Security metrics to manage change
8
--
10
Alexandra Boldyreva
,
Paul Grubbs
.
Making encryption work in the cloud
10
--
14
Danny Bradbury
.
Anonymity and privacy: a guide for the perplexed
15
--
17
Paul Martini
.
A secure approach to wearable technology
17
--
20
Steve Mansfield-Devine
.
Masking sensitive data
Volume
2014
, Issue
1
5
--
7
Steve Watts
.
Protecting your identity when working remotely
7
--
9
Barry Shteiman
.
Why CMS platforms are breeding security vulnerabilities
9
--
11
Mike Patterson
.
An index for network threat detection
11
--
15
Steve Mansfield-Devine
.
Interview: Corey Nachreiner, WatchGuard - security visibility
16
--
17
Richard Moulds
.
The global data protection conundrum
18
--
19
Conrad Constantine
.
Big data: an information security context