Journal: Network Security

Volume 2017, Issue 9

5 -- 7Travis Farral. Nation-state attacks: practical defences against advanced adversaries
8 -- 10Jon Condra. Assessing nation state threats
10 -- 12Adam Vincent. State-sponsored hackers: the new normal for business
13 -- 16Nick Robinson, Keith Martin. Distributed denial of government: the Estonian Data Embassy Initiative
17 -- 19Phil Beckett. Data and IP are the new nuclear: facing up to state-sponsored threats
20 -- 0Colin Tankard. Who are the attackers?

Volume 2017, Issue 8

5 -- 7Jeff Luszcz. How maverick developers can create risk in the software and IoT supply chain
7 -- 11Eileen Haggerty. Healthcare and digital transformation
11 -- 13Tom Major. Weaponising threat intelligence data
13 -- 15Paul German. Time to bury dedicated hardware-based security solutions
15 -- 19Steve Mansfield-Devine. Adapting to the disappearing perimeter
20 -- 0Tim Erridge. Good will hunting

Volume 2017, Issue 7

5 -- 8Simon Parkinson. Use of access control to minimise ransomware impact
9 -- 11Michael Wood. Top requirements on the SD-WAN security checklist
11 -- 17Mark Taylor, Denis Reilly, Brett Lempereur. An access control management protocol for Internet of Things devices
17 -- 19Malcolm Murphy. The Internet of Things and the threat it poses to DNS
20 -- 0Karen Renaud. It makes you Wanna Cry

Volume 2017, Issue 6

5 -- 8Daniel Shugrue. Fighting application threats with cloud-based WAFs
8 -- 11Jesper Zerlang. GDPR: a milestone in convergence for cyber-security and compliance
11 -- 13Jay Botelho. How automating data collection can improve cyber-security
14 -- 19Steve Mansfield-Devine. Leaks and ransoms - the key threats to healthcare organisations
20 -- 0Colin Tankard. Securing emails

Volume 2017, Issue 5

4 -- 0SM-D. Practical Packet Analysis Chris Sanders
4 -- 0SM-D. We Know All About You Rhodri Jeffreys-Jones
5 -- 7Sean Newman. Service providers: the gatekeepers of Internet security
8 -- 13Jacob Gajek. Macro malware: dissecting a malicious Word document
13 -- 17Steve Mansfield-Devine. Threat hunting: assuming the worst to strengthen resilience
17 -- 19Travis Farral. The attribution problem with information security attacks
20 -- 0Tim Erridge. Gaining strength

Volume 2017, Issue 4

4 -- 0SM-D. Hiding Behind the Keyboard
5 -- 7Leon Adato. Monitoring and automation: it's easier than you think
7 -- 11Steve Mansfield-Devine. Fileless attacks: compromising targets without malware
12 -- 14Alan Zeichick. Enabling innovation by opening up the network
14 -- 17Rohit Talwar, April Koury. Artificial intelligence - the next frontier in IT security?
18 -- 19Mark Hickman. The threat from inside
20 -- 0Karen Renaud. Facts do not change minds

Volume 2017, Issue 3

5 -- 7Colin Tankard. Encryption as the cornerstone of big data security
8 -- 10Lewis Henderson. National infrastructure - the next step for seasoned hackers
10 -- 12Vincent Smyth. Software vulnerability management: how intelligence helps reduce the risk
12 -- 14Nick Hawkins. Why communication is vital during a cyber-attack
15 -- 18Tim Ring. The Russians are coming! Are security firms over-hyping the hacker threat?
18 -- 19Andy Green. Ransomware and the GDPR
20 -- 0Colin Tankard. The Firewall: The eSignature comes of age

Volume 2017, Issue 2

5 -- 7Andy Lilly. IMSI catchers: hacking mobile communications
8 -- 9Jack Bedell-Pearce. When big data and Brexit collide
9 -- 11Jamie Graves. What is intellectual property and how do you protect it?
12 -- 13Gert-Jan Schenk. Retailers must focus on the growing cyberthreat landscape
14 -- 19Steve Mansfield-Devine. A process of defence - securing industrial control systems
20 -- 0Tim Erridge. Optimising risk management

Volume 2017, Issue 12

5 -- 9Steven Furnell, Ismini Vasileiou. Security education and awareness: just let them burn?
10 -- 16Filippo Lauria. How to footprint, report and remotely secure compromised IoT devices
16 -- 19Steve Mansfield-Devine. The right response: how organisations should react to security incidents
20 -- 0Tim Erridge. A framework for threats

Volume 2017, Issue 11

5 -- 6Chris Steffen. Should jump box servers be consigned to history?
7 -- 8Nick Thompson. Putting security at the heart of app development
8 -- 15Akashdeep Bhardwaj, Sam Goundar. Security challenges for cloud-based email infrastructure
16 -- 19Steve Mansfield-Devine. Going critical: attacks against national infrastructure
20 -- 0Colin Tankard. BYOE: New kid on the block

Volume 2017, Issue 10

5 -- 8Eric Lundbohm. Understanding nation-state attacks
8 -- 10John Bambenek. Nation-state attacks: the new normal
11 -- 13Brian Laing. Cyber global warming: six steps towards meltdown
13 -- 19Steve Mansfield-Devine. Weaponising the Internet of Things
20 -- 0Karen Renaud, Gareth Renaud. To phish, or not to phish..

Volume 2017, Issue 1

5 -- 6Jamie Graves. Data flow management: why and how
7 -- 12Steve Mansfield-Devine. Open source software: determining the real risk posed by vulnerabilities
12 -- 14Michael Wood. How to make SD-WAN secure
14 -- 16Paul German. Is your Session Border Controller providing a false sense of security?
17 -- 19Bill Welch. Exploiting the weaknesses of SS7
20 -- 0Karen Renaud. Webcam covering phenomenon