default search action
Network Security, Volume 2014
Volume 2014, Number 1, January 2014
- Steve Watts:
Protecting your identity when working remotely. 5-7 - Barry Shteiman:
Why CMS platforms are breeding security vulnerabilities. 7-9 - Mike Patterson:
An index for network threat detection. 9-11 - Steve Mansfield-Devine:
Interview: Corey Nachreiner, WatchGuard - security visibility. 11-15 - Richard Moulds:
The global data protection conundrum. 16-17 - Conrad Constantine:
Big data: an information security context. 18-19
Volume 2014, Number 2, February 2014
- Mark Kedgley:
File integrity monitoring in the modern threat landscape. 5-8 - Peter Heim:
The quest for clarity on data protection and security. 8-10 - Stephen Allen:
Medical device software under the microscope. 11-12 - Hongwen Zhang:
A vision for cloud security. 12-15 - Steve Gold:
In search of a new perimeter. 15-20
Volume 2014, Number 3, March 2014
- Tracey Caldwell:
Call the digital fire brigade. 5-8 - Pat Barnes:
Using DNS to protect networks from threats within. 9-11 - Daniëlle van Leeuwen:
Bring your own software. 12-13 - Danny Bradbury:
Can we make email secure? 13-16 - Florian Malecki:
The cost of network-based attacks. 17-18 - Mike Keightley:
The looming XP disaster in industrial environments. 18-20
Volume 2014, Number 4, April 2014
- Ross Brewer:
Advanced persistent threats: minimising the damage. 5-9 - Harry Sverdlove:
The Java vulnerability landscape. 9-14 - Danny Bradbury:
Unveiling the dark web. 14-17 - Keith Bird:
Sandboxing: a line in the sand against malware. 18-20
Volume 2014, Number 5, May 2014
- Martin Maisey:
Moving to analysis-led cyber-security. 5-12 - Mark Southam:
DNSSEC: What it is and why it matters. 12-15 - Jon Inns:
The evolution and application of SIEM systems. 16-17 - Sonia Blizzard:
Don't feed the hackers: how your attitude to data security could affect business. 18-20
Volume 2014, Number 6, June 2014
- C. J. Radford:
Challenges and solutions protecting data within Amazon Web Services. 5-8 - Danny Bradbury:
Testing the defences of bulletproof hosting companies. 8-12 - Steve Gold:
Challenges ahead on the digital forensics and audit trails. 12-17 - Chris Marrison:
DNS as an attack vector - and how businesses can keep it secure. 17-20
Volume 2014, Number 7, July 2014
- Jean-Yves Bisiaux:
DNS threats and mitigation strategies. 5-9 - Allen Storey:
There's nothing 'smart' about insecure connected devices. 9-12 - Patrick Bedwell:
Finding a new approach to SIEM to suit the SME environment. 12-16 - Steve Mansfield-Devine:
Building in security. 16-19
Volume 2014, Number 8, August 2014
- Phil Bridge:
EU puts pressure on businesses to erase data. 5-8 - Andrew Tang:
A guide to penetration testing. 8-11 - Mark Lowe:
Defending against cyber-criminals targeting business websites. 11-13 - Steve Mansfield-Devine:
Not coping with change. 14-17 - Steve Watts:
Intelligent combination - the benefits of tokenless two-factor authentication. 17-20
Volume 2014, Number 9, September 2014
- Simon Saunders:
Protecting against espionage. 5-7 - Phil Beckett:
BYOD - popular and problematic. 7-9 - Julie Lockner:
Do you know where your sensitive data is kept? 10-12 - Steve Mansfield-Devine:
Hacking on an industrial scale. 12-16 - Oded Gonda:
Understanding the threat to SCADA networks. 17-18 - Lasse Andresen:
Open sourcing the future of IAM. 18-20
Volume 2014, Number 10, October 2014
- Jody Brazil:
Security metrics to manage change. 5-7 - Alexandra Boldyreva, Paul Grubbs:
Making encryption work in the cloud. 8-10 - Danny Bradbury:
Anonymity and privacy: a guide for the perplexed. 10-14 - Paul Martini:
A secure approach to wearable technology. 15-17 - Steve Mansfield-Devine:
Masking sensitive data. 17-20
Volume 2014, Number 11, November 2014
- Ken Munro:
Android scraping: accessing personal data on mobile devices. 5-9 - Mark John Taylor, John Haggerty, David Gresty, Peter Almond, Tom Berry:
Forensic investigation of social networking applications. 9-16 - Steve Mansfield-Devine:
Mobile security: it's all about behaviour. 16-20
Volume 2014, Number 12, December 2014
- David Tipping:
The rising threats from Voice over IP. 5-6 - Gursev Singh Kalra:
Threat analysis of an enterprise messaging system. 7-13 - Robert Jones, Tony Dearsley:
Time for a data detox. 13-15 - Joe Goldberg:
Tackling unknown threats. 16-17 - Ashley Lane:
Cross domain solutions - and why they matter. 18-20
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.