researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Network Security
Home
Index
Info
Volume
Volume
2015
, Issue
9
5
--
8
Kevin Bocek
.
Is HTTPS enough to protect governments?
8
--
16
Steve Mansfield-Devine
.
The Ashley Madison affair
16
--
18
Richard Kirk
.
Cars of the future: the Internet of Things in the automotive industry
19
--
20
Shahaf Rozanski
.
Using cloud data to accelerate forensic investigations
Volume
2015
, Issue
8
5
--
8
Vincent Smyth
.
Cyber-security fortresses built on quicksand
8
--
13
Paul Simmonds
.
The digital identity issue
13
--
15
Chris Richter
.
Managing your data risk: back to basics
15
--
18
Ricky Knights
,
Emma Morris
.
Move to intelligence-driven security
18
--
20
Darren Anstee
.
Preparing for tomorrow's threat landscape
Volume
2015
, Issue
7
5
--
10
Matt Kingswood
.
Climate change will require more agile business continuity planning
10
--
14
Tim Ring
.
Cloud security fears: fact or FUD?
14
--
16
Matthew McKenna
.
How federal agencies can secure their cloud migrations
17
--
18
Dave Larson
,
Stephen Gates
.
Is it true that what you can't see can't hurt you?
19
--
20
Steve Watts
.
NFC and 2FA: the death of the password?
Volume
2015
, Issue
6
5
--
8
Tim Ring
.
Keeping tabs on tracking technology
8
--
10
Stuart Hooson
.
Smarten your data security before new EU legislation or risk corporate loss
11
--
14
Szilard Stange
.
Detecting malware across operating systems
15
--
17
David Hald
,
Alex Udakis
.
Rethinking remote authentication: time to kiss tokens goodbye?
18
--
20
Boris Huard
.
The data quality paradox
Volume
2015
, Issue
5
5
--
8
Ross Brewer
.
Cyber threats: reducing the time to detection and response
8
--
11
Colin Tankard
.
Data classification - the foundation of information security
12
--
17
Tracey Caldwell
.
Hacktivism goes hardcore
18
--
19
Paul German
.
The dangers of unsecured voice
Volume
2015
, Issue
4
5
--
10
Peter Clay
.
A modern threat response framework
11
--
12
Mark Kedgley
.
If you can't stop the breach, at least spot the breach
13
--
16
Mike Auty
.
Anatomy of an advanced persistent threat
17
--
18
François Amigorena
.
Relevance is the key to users' security understanding
18
--
20
Phil Beckett
.
Getting your back-up data back up to date
Volume
2015
, Issue
3
5
--
8
Colin Tankard
.
How secure is your building?
8
--
10
Sol Cates
.
The evolution of security intelligence
10
--
13
Cath Everett
.
Should the dark net be taken out?
14
--
18
Guy Buesnel
.
Threats to satellite navigation systems
18
--
20
Gary Newe
.
Delivering the Internet of Things
Volume
2015
, Issue
2
5
--
10
Steve Mansfield-Devine
.
The privacy dilemma
10
--
13
Poul Nielsen
.
The importance of context in keeping end users secure
13
--
16
John Green
.
Staying ahead of cyber-attacks
16
--
18
Gavin Millard
.
Continuous monitoring for transient devices
18
--
20
Phil Beckett
.
An intelligent approach to security
Volume
2015
, Issue
12
5
--
7
Richard Kirk
.
Threat sharing - a neighbourhood watch for security practitioners
8
--
11
Tracey Caldwell
.
Taking agile development beyond software - what are the security risks?
12
--
13
Leon Adato
.
Network outages - pick your battles
14
--
18
Steve Mansfield-Devine
.
Under the radar
18
--
19
Steve Watts
.
The holy grail of authentication
Volume
2015
, Issue
11
5
--
8
Steve Mansfield-Devine
.
When advertising turns nasty
9
--
11
Paul German
.
Counting the security cost of cheap calls
11
--
16
Tim Ring
.
Connected cars - the next targe tfor hackers
16
--
17
Phil Beckett
.
The business risks of using smartphones
18
--
20
Bradley Maule-ffinch
.
Key trends in information security
Volume
2015
, Issue
10
5
--
7
Jan Hof
.
Addressing new demands on network security
8
--
10
Chris Marrison
.
Understanding the threats to DNS and how to secure it
11
--
13
Reuven Harrison
.
Reducing complexity in securing heterogeneous networks
13
--
20
Steve Mansfield-Devine
.
The growth and evolution of DDoS
Volume
2015
, Issue
1
5
--
8
Ben Densham
.
Three cyber-security strategies to mitigate the impact of a data breach
9
--
12
Ashish Patel
.
Network performance without compromising security
12
--
14
Guillermo Lafuente
.
The big data security challenge
14
--
18
Steve Mansfield-Devine
.
Managing identity for a competitive edge
18
--
20
Hongwen Zhang
.
Bring your own encryption: balancing security with practicality