researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Network Security
Home
Index
Info
Volume
Volume
2017
, Issue
9
5
--
7
Travis Farral
.
Nation-state attacks: practical defences against advanced adversaries
8
--
10
Jon Condra
.
Assessing nation state threats
10
--
12
Adam Vincent
.
State-sponsored hackers: the new normal for business
13
--
16
Nick Robinson
,
Keith Martin
.
Distributed denial of government: the Estonian Data Embassy Initiative
17
--
19
Phil Beckett
.
Data and IP are the new nuclear: facing up to state-sponsored threats
20
--
0
Colin Tankard
.
Who are the attackers?
Volume
2017
, Issue
8
5
--
7
Jeff Luszcz
.
How maverick developers can create risk in the software and IoT supply chain
7
--
11
Eileen Haggerty
.
Healthcare and digital transformation
11
--
13
Tom Major
.
Weaponising threat intelligence data
13
--
15
Paul German
.
Time to bury dedicated hardware-based security solutions
15
--
19
Steve Mansfield-Devine
.
Adapting to the disappearing perimeter
20
--
0
Tim Erridge
.
Good will hunting
Volume
2017
, Issue
7
5
--
8
Simon Parkinson
.
Use of access control to minimise ransomware impact
9
--
11
Michael Wood
.
Top requirements on the SD-WAN security checklist
11
--
17
Mark Taylor
,
Denis Reilly
,
Brett Lempereur
.
An access control management protocol for Internet of Things devices
17
--
19
Malcolm Murphy
.
The Internet of Things and the threat it poses to DNS
20
--
0
Karen Renaud
.
It makes you Wanna Cry
Volume
2017
, Issue
6
5
--
8
Daniel Shugrue
.
Fighting application threats with cloud-based WAFs
8
--
11
Jesper Zerlang
.
GDPR: a milestone in convergence for cyber-security and compliance
11
--
13
Jay Botelho
.
How automating data collection can improve cyber-security
14
--
19
Steve Mansfield-Devine
.
Leaks and ransoms - the key threats to healthcare organisations
20
--
0
Colin Tankard
.
Securing emails
Volume
2017
, Issue
5
4
--
0
SM-D
.
Practical Packet Analysis Chris Sanders
4
--
0
SM-D
.
We Know All About You Rhodri Jeffreys-Jones
5
--
7
Sean Newman
.
Service providers: the gatekeepers of Internet security
8
--
13
Jacob Gajek
.
Macro malware: dissecting a malicious Word document
13
--
17
Steve Mansfield-Devine
.
Threat hunting: assuming the worst to strengthen resilience
17
--
19
Travis Farral
.
The attribution problem with information security attacks
20
--
0
Tim Erridge
.
Gaining strength
Volume
2017
, Issue
4
4
--
0
SM-D
.
Hiding Behind the Keyboard
5
--
7
Leon Adato
.
Monitoring and automation: it's easier than you think
7
--
11
Steve Mansfield-Devine
.
Fileless attacks: compromising targets without malware
12
--
14
Alan Zeichick
.
Enabling innovation by opening up the network
14
--
17
Rohit Talwar
,
April Koury
.
Artificial intelligence - the next frontier in IT security?
18
--
19
Mark Hickman
.
The threat from inside
20
--
0
Karen Renaud
.
Facts do not change minds
Volume
2017
, Issue
3
5
--
7
Colin Tankard
.
Encryption as the cornerstone of big data security
8
--
10
Lewis Henderson
.
National infrastructure - the next step for seasoned hackers
10
--
12
Vincent Smyth
.
Software vulnerability management: how intelligence helps reduce the risk
12
--
14
Nick Hawkins
.
Why communication is vital during a cyber-attack
15
--
18
Tim Ring
.
The Russians are coming! Are security firms over-hyping the hacker threat?
18
--
19
Andy Green
.
Ransomware and the GDPR
20
--
0
Colin Tankard
.
The Firewall: The eSignature comes of age
Volume
2017
, Issue
2
5
--
7
Andy Lilly
.
IMSI catchers: hacking mobile communications
8
--
9
Jack Bedell-Pearce
.
When big data and Brexit collide
9
--
11
Jamie Graves
.
What is intellectual property and how do you protect it?
12
--
13
Gert-Jan Schenk
.
Retailers must focus on the growing cyberthreat landscape
14
--
19
Steve Mansfield-Devine
.
A process of defence - securing industrial control systems
20
--
0
Tim Erridge
.
Optimising risk management
Volume
2017
, Issue
12
5
--
9
Steven Furnell
,
Ismini Vasileiou
.
Security education and awareness: just let them burn?
10
--
16
Filippo Lauria
.
How to footprint, report and remotely secure compromised IoT devices
16
--
19
Steve Mansfield-Devine
.
The right response: how organisations should react to security incidents
20
--
0
Tim Erridge
.
A framework for threats
Volume
2017
, Issue
11
5
--
6
Chris Steffen
.
Should jump box servers be consigned to history?
7
--
8
Nick Thompson
.
Putting security at the heart of app development
8
--
15
Akashdeep Bhardwaj
,
Sam Goundar
.
Security challenges for cloud-based email infrastructure
16
--
19
Steve Mansfield-Devine
.
Going critical: attacks against national infrastructure
20
--
0
Colin Tankard
.
BYOE: New kid on the block
Volume
2017
, Issue
10
5
--
8
Eric Lundbohm
.
Understanding nation-state attacks
8
--
10
John Bambenek
.
Nation-state attacks: the new normal
11
--
13
Brian Laing
.
Cyber global warming: six steps towards meltdown
13
--
19
Steve Mansfield-Devine
.
Weaponising the Internet of Things
20
--
0
Karen Renaud
,
Gareth Renaud
.
To phish, or not to phish..
Volume
2017
, Issue
1
5
--
6
Jamie Graves
.
Data flow management: why and how
7
--
12
Steve Mansfield-Devine
.
Open source software: determining the real risk posed by vulnerabilities
12
--
14
Michael Wood
.
How to make SD-WAN secure
14
--
16
Paul German
.
Is your Session Border Controller providing a false sense of security?
17
--
19
Bill Welch
.
Exploiting the weaknesses of SS7
20
--
0
Karen Renaud
.
Webcam covering phenomenon