Journal: Network Security

Volume 2015, Issue 9

5 -- 8Kevin Bocek. Is HTTPS enough to protect governments?
8 -- 16Steve Mansfield-Devine. The Ashley Madison affair
16 -- 18Richard Kirk. Cars of the future: the Internet of Things in the automotive industry
19 -- 20Shahaf Rozanski. Using cloud data to accelerate forensic investigations

Volume 2015, Issue 8

5 -- 8Vincent Smyth. Cyber-security fortresses built on quicksand
8 -- 13Paul Simmonds. The digital identity issue
13 -- 15Chris Richter. Managing your data risk: back to basics
15 -- 18Ricky Knights, Emma Morris. Move to intelligence-driven security
18 -- 20Darren Anstee. Preparing for tomorrow's threat landscape

Volume 2015, Issue 7

5 -- 10Matt Kingswood. Climate change will require more agile business continuity planning
10 -- 14Tim Ring. Cloud security fears: fact or FUD?
14 -- 16Matthew McKenna. How federal agencies can secure their cloud migrations
17 -- 18Dave Larson, Stephen Gates. Is it true that what you can't see can't hurt you?
19 -- 20Steve Watts. NFC and 2FA: the death of the password?

Volume 2015, Issue 6

5 -- 8Tim Ring. Keeping tabs on tracking technology
8 -- 10Stuart Hooson. Smarten your data security before new EU legislation or risk corporate loss
11 -- 14Szilard Stange. Detecting malware across operating systems
15 -- 17David Hald, Alex Udakis. Rethinking remote authentication: time to kiss tokens goodbye?
18 -- 20Boris Huard. The data quality paradox

Volume 2015, Issue 5

5 -- 8Ross Brewer. Cyber threats: reducing the time to detection and response
8 -- 11Colin Tankard. Data classification - the foundation of information security
12 -- 17Tracey Caldwell. Hacktivism goes hardcore
18 -- 19Paul German. The dangers of unsecured voice

Volume 2015, Issue 4

5 -- 10Peter Clay. A modern threat response framework
11 -- 12Mark Kedgley. If you can't stop the breach, at least spot the breach
13 -- 16Mike Auty. Anatomy of an advanced persistent threat
17 -- 18François Amigorena. Relevance is the key to users' security understanding
18 -- 20Phil Beckett. Getting your back-up data back up to date

Volume 2015, Issue 3

5 -- 8Colin Tankard. How secure is your building?
8 -- 10Sol Cates. The evolution of security intelligence
10 -- 13Cath Everett. Should the dark net be taken out?
14 -- 18Guy Buesnel. Threats to satellite navigation systems
18 -- 20Gary Newe. Delivering the Internet of Things

Volume 2015, Issue 2

5 -- 10Steve Mansfield-Devine. The privacy dilemma
10 -- 13Poul Nielsen. The importance of context in keeping end users secure
13 -- 16John Green. Staying ahead of cyber-attacks
16 -- 18Gavin Millard. Continuous monitoring for transient devices
18 -- 20Phil Beckett. An intelligent approach to security

Volume 2015, Issue 12

5 -- 7Richard Kirk. Threat sharing - a neighbourhood watch for security practitioners
8 -- 11Tracey Caldwell. Taking agile development beyond software - what are the security risks?
12 -- 13Leon Adato. Network outages - pick your battles
14 -- 18Steve Mansfield-Devine. Under the radar
18 -- 19Steve Watts. The holy grail of authentication

Volume 2015, Issue 11

5 -- 8Steve Mansfield-Devine. When advertising turns nasty
9 -- 11Paul German. Counting the security cost of cheap calls
11 -- 16Tim Ring. Connected cars - the next targe tfor hackers
16 -- 17Phil Beckett. The business risks of using smartphones
18 -- 20Bradley Maule-ffinch. Key trends in information security

Volume 2015, Issue 10

5 -- 7Jan Hof. Addressing new demands on network security
8 -- 10Chris Marrison. Understanding the threats to DNS and how to secure it
11 -- 13Reuven Harrison. Reducing complexity in securing heterogeneous networks
13 -- 20Steve Mansfield-Devine. The growth and evolution of DDoS

Volume 2015, Issue 1

5 -- 8Ben Densham. Three cyber-security strategies to mitigate the impact of a data breach
9 -- 12Ashish Patel. Network performance without compromising security
12 -- 14Guillermo Lafuente. The big data security challenge
14 -- 18Steve Mansfield-Devine. Managing identity for a competitive edge
18 -- 20Hongwen Zhang. Bring your own encryption: balancing security with practicality