researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Network Security
Home
Index
Info
Volume
Volume
2020
, Issue
9
6
--
9
Mike Campfield
.
The problem with (most) network detection and response
9
--
15
Fabio Cavaliere
,
John Mattsson
,
Ben Smeets
.
The security implications of quantum cryptography and quantum computing
16
--
17
Israel Barak
.
Critical infrastructure under attack: lessons from a honeypot
18
--
19
Michael Eckel
,
Tom Laffey
.
Ensuring the integrity and security of network equipment is critical in the fight against cyber attacks
20
--
0
Andrew Cooke
.
A unique year for cyber security
Volume
2020
, Issue
8
7
--
9
Mark Rodbert
.
Why organisational readiness is vital in the fight against insider threats
9
--
13
Dave Waterson
.
Managing endpoints, the weakest link in the security chain
13
--
17
Ion-Alexandru Secara
.
Zoombombing - the end-to-end fallacy
18
--
19
Rory Duncan
.
What does 'secure by design' actually mean?
20
--
0
David Fox
.
Dealing with technical debt
Volume
2020
, Issue
7
6
--
9
Rod Cope
.
Strong security starts with software development
9
--
12
Martin Jartelius
.
The 2020 Data Breach Investigations Report - a CSO's perspective
12
--
14
Mieng Lim
.
Avoiding the most common vulnerability-management pitfalls
14
--
17
Simon Wood
.
Adhering to privacy by design with identity-as-a-service
17
--
19
Dale Murray
.
Open source and security: why transparency now equals strength
20
--
0
Karen Renaud
,
Zinaida Benenson
,
Daniela Oliveira
.
Balancing resistance and resilience
Volume
2020
, Issue
6
6
--
7
Leila Powell
.
How data can be the lingua franca for security and IT
8
--
11
Paul Hampton
.
Keeping a secure hold on data through modern electronic content management
11
--
14
Gus Evangelakos
.
Keeping critical assets safe when teleworking is the new norm
14
--
17
Ben Bulpett
.
Safeguarding against the insider threat
17
--
19
Thomas Deighton
,
Michael Wakefield
.
Keep security top of mind when moving into the cloud
20
--
0
Kate MacMillan
.
Trusting the CISO
Volume
2020
, Issue
5
6
--
8
Florian Malecki
.
Optimising storage processes to reduce the risk of ransomware
8
--
19
Meryem Amar
,
Bouabid El Ouahidi
.
Hybrid intrusion detection system using machine learning
20
--
0
Colin Tankard
.
Pandemic underpins need for SOAR
Volume
2020
, Issue
4
6
--
7
Terry Ray
.
DDoS defence: new tactics for a rising shadow industry
8
--
11
Phil Chapman
.
Are your IT staff ready for the pandemic-driven insider threat?
11
--
14
Cary Wright
.
Essentials for selecting a network monitoring tool
14
--
16
Simon Kelf
.
The security risks created by cloud migration and how to overcome them
16
--
18
David Higgins
.
Innovation and risk walk hand-in-hand with 5G and IoT
18
--
19
Alyn Hockey
.
Uncovering the cyber security challenges in healthcare
20
--
0
David Fox
.
Losing the human touch
Volume
2020
, Issue
3
6
--
8
Roy Reynolds
.
The four biggest malware threats to UK businesses
8
--
14
Yessine Borchani
.
Advanced malicious beaconing detection through AI
14
--
17
Colby Dyess
.
Maintaining a balance between agility and security in the cloud
17
--
19
Pascal Geenens
.
How worried should you be about nation-state attacks?
20
--
0
Karen Renaud
.
Strong passwords can't keep children safe
Volume
2020
, Issue
2
6
--
8
Cindy Blake
.
Reducing risk with end-to-end application security automation
8
--
14
Pranshu Bajpai
,
Richard J. Enbody
.
Dissecting .NET ransomware: key generation, encryption and operation
14
--
19
Akashdeep Bhardwaj
,
Sam Goundar
.
Keyloggers: silent cyber security weapons
20
--
0
Kate MacMillan
.
Signs of things to come?
Volume
2020
, Issue
12
6
--
8
Michael Wood
.
How SASE is defining the future of network security
8
--
12
Mark Sangster
.
When it comes to cyber security, ignorance isn't bliss - it's negligence
12
--
17
Steve Mansfield-Devine
.
Nation-state attacks: the escalating menace
18
--
19
Gus Evangelakos
.
Where conventional security control validation falls short when evaluating organisational threats
20
--
0
Paul Stone
.
Securing Windows networks against WSUS attacks
Volume
2020
, Issue
11
6
--
8
Amy Hodler
.
Can graphs mitigate against coronavirus-related cybercrime?
8
--
11
Andy Still
.
Bot mitigation - how gapsin understanding and ownership are exposingbusinesses to greater threats
11
--
13
Armin Wasicek
.
The future of 5G smart home network security is micro-segmentation
14
--
17
Brian Trzupek
.
How DIY PKI often negates the promise of public key encryption
17
--
19
René Seifert
.
Digital identities - self-sovereignty and blockchain are the keys to success
20
--
0
Karen Renaud
,
Verena Zimmermann
.
How to nudge in cyber security
Volume
2020
, Issue
10
6
--
10
Assaf Morag
.
Exploitable hosts used in cloud native cyber attacks
10
--
13
Nadav Erez
.
How threat actors abuse ICS-specific file types
13
--
17
Tom Hofmann
.
How organisations can ethically negotiate ransomware payments
17
--
19
Robert Meyers
.
Data highway and the digital transformation: arguments for secure, centralised log management
20
--
0
Colin Tankard
.
Remote working reset now required
Volume
2020
, Issue
1
6
--
8
Roy Reynolds
.
It's time to rethink DDoS protection
8
--
13
Andres Andreu
.
Operational technology security - a data perspective
14
--
16
Scott Gordon 0001
.
Securing workers beyond the perimeter
17
--
19
Guy Bunker
.
Targeted cyber attacks: how to mitigate the increasing risk
20
--
0
Colin Tankard
.
The power of voice