Journal: Network Security

Volume 2020, Issue 9

6 -- 9Mike Campfield. The problem with (most) network detection and response
9 -- 15Fabio Cavaliere, John Mattsson, Ben Smeets. The security implications of quantum cryptography and quantum computing
16 -- 17Israel Barak. Critical infrastructure under attack: lessons from a honeypot
18 -- 19Michael Eckel, Tom Laffey. Ensuring the integrity and security of network equipment is critical in the fight against cyber attacks
20 -- 0Andrew Cooke. A unique year for cyber security

Volume 2020, Issue 8

7 -- 9Mark Rodbert. Why organisational readiness is vital in the fight against insider threats
9 -- 13Dave Waterson. Managing endpoints, the weakest link in the security chain
13 -- 17Ion-Alexandru Secara. Zoombombing - the end-to-end fallacy
18 -- 19Rory Duncan. What does 'secure by design' actually mean?
20 -- 0David Fox. Dealing with technical debt

Volume 2020, Issue 7

6 -- 9Rod Cope. Strong security starts with software development
9 -- 12Martin Jartelius. The 2020 Data Breach Investigations Report - a CSO's perspective
12 -- 14Mieng Lim. Avoiding the most common vulnerability-management pitfalls
14 -- 17Simon Wood. Adhering to privacy by design with identity-as-a-service
17 -- 19Dale Murray. Open source and security: why transparency now equals strength
20 -- 0Karen Renaud, Zinaida Benenson, Daniela Oliveira. Balancing resistance and resilience

Volume 2020, Issue 6

6 -- 7Leila Powell. How data can be the lingua franca for security and IT
8 -- 11Paul Hampton. Keeping a secure hold on data through modern electronic content management
11 -- 14Gus Evangelakos. Keeping critical assets safe when teleworking is the new norm
14 -- 17Ben Bulpett. Safeguarding against the insider threat
17 -- 19Thomas Deighton, Michael Wakefield. Keep security top of mind when moving into the cloud
20 -- 0Kate MacMillan. Trusting the CISO

Volume 2020, Issue 5

6 -- 8Florian Malecki. Optimising storage processes to reduce the risk of ransomware
8 -- 19Meryem Amar, Bouabid El Ouahidi. Hybrid intrusion detection system using machine learning
20 -- 0Colin Tankard. Pandemic underpins need for SOAR

Volume 2020, Issue 4

6 -- 7Terry Ray. DDoS defence: new tactics for a rising shadow industry
8 -- 11Phil Chapman. Are your IT staff ready for the pandemic-driven insider threat?
11 -- 14Cary Wright. Essentials for selecting a network monitoring tool
14 -- 16Simon Kelf. The security risks created by cloud migration and how to overcome them
16 -- 18David Higgins. Innovation and risk walk hand-in-hand with 5G and IoT
18 -- 19Alyn Hockey. Uncovering the cyber security challenges in healthcare
20 -- 0David Fox. Losing the human touch

Volume 2020, Issue 3

6 -- 8Roy Reynolds. The four biggest malware threats to UK businesses
8 -- 14Yessine Borchani. Advanced malicious beaconing detection through AI
14 -- 17Colby Dyess. Maintaining a balance between agility and security in the cloud
17 -- 19Pascal Geenens. How worried should you be about nation-state attacks?
20 -- 0Karen Renaud. Strong passwords can't keep children safe

Volume 2020, Issue 2

6 -- 8Cindy Blake. Reducing risk with end-to-end application security automation
8 -- 14Pranshu Bajpai, Richard J. Enbody. Dissecting .NET ransomware: key generation, encryption and operation
14 -- 19Akashdeep Bhardwaj, Sam Goundar. Keyloggers: silent cyber security weapons
20 -- 0Kate MacMillan. Signs of things to come?

Volume 2020, Issue 12

6 -- 8Michael Wood. How SASE is defining the future of network security
8 -- 12Mark Sangster. When it comes to cyber security, ignorance isn't bliss - it's negligence
12 -- 17Steve Mansfield-Devine. Nation-state attacks: the escalating menace
18 -- 19Gus Evangelakos. Where conventional security control validation falls short when evaluating organisational threats
20 -- 0Paul Stone. Securing Windows networks against WSUS attacks

Volume 2020, Issue 11

6 -- 8Amy Hodler. Can graphs mitigate against coronavirus-related cybercrime?
8 -- 11Andy Still. Bot mitigation - how gapsin understanding and ownership are exposingbusinesses to greater threats
11 -- 13Armin Wasicek. The future of 5G smart home network security is micro-segmentation
14 -- 17Brian Trzupek. How DIY PKI often negates the promise of public key encryption
17 -- 19René Seifert. Digital identities - self-sovereignty and blockchain are the keys to success
20 -- 0Karen Renaud, Verena Zimmermann. How to nudge in cyber security

Volume 2020, Issue 10

6 -- 10Assaf Morag. Exploitable hosts used in cloud native cyber attacks
10 -- 13Nadav Erez. How threat actors abuse ICS-specific file types
13 -- 17Tom Hofmann. How organisations can ethically negotiate ransomware payments
17 -- 19Robert Meyers. Data highway and the digital transformation: arguments for secure, centralised log management
20 -- 0Colin Tankard. Remote working reset now required

Volume 2020, Issue 1

6 -- 8Roy Reynolds. It's time to rethink DDoS protection
8 -- 13Andres Andreu. Operational technology security - a data perspective
14 -- 16Scott Gordon 0001. Securing workers beyond the perimeter
17 -- 19Guy Bunker. Targeted cyber attacks: how to mitigate the increasing risk
20 -- 0Colin Tankard. The power of voice