


default search action
Network Security, Volume 2016
Volume 2016, Number 1, January 2016
- Michael Shaulov:
Bridging mobile security gaps. 5-8 - Michael Fimin:
Breaking bad: avoiding the 10 worst IT admin habits. 8-11 - Fred Touchette:
The evolution of malware. 11-14 - William Wilkinson:
Cyber discovery in investigations. 15-17 - Jason King, Dan Evans:
Key criteria for selecting a secure cloud wireless net work. 17-20
Volume 2016, Number 2, February 2016
- Ian Muscat:
Web vulnerabilities: identifying patterns and remedies. 5-10 - Cath Everett:
Are passwords finally dying? 10-14 - Steve Mansfield-Devine:
Security guarantees: building credibility for security vendors. 14-18 - Rajesh Ganesan:
Stepping up security with password management control. 18-19
Volume 2016, Number 3, March 2016
- Dave Larson:
Distributed denial of service attacks - holding back the flood. 5-7 - Garrett Gross:
Detecting and destroying botnets. 7-10 - Hamish Haughey, Gregory Epiphaniou
, Haider M. Al-Khateeb
:
Anonymity networks and the fragile cyber ecosystem. 10-18 - Paul German:
A new month, a new data breach. 18-20
Volume 2016, Number 4, April 2016
- Steven Furnell
:
Vulnerability management: not a patch on where we should be? 5-9 - Will Harwood:
Locking up passwords - for good. 10-13 - Steve Mansfield-Devine:
Your life in your hands: the security issues with healthcare apps. 14-18 - Shahaf Rozanski:
Peering through the cloud. 19-20
Volume 2016, Number 5, May 2016
- John Grimm:
PKI: crumbling under the pressure. 5-7 - Mark John Taylor, John Haggerty, David Gresty, Chris Wren, Tom Berry:
Avoiding the misuse of social media by employees. 8-11 - Mike Pittenger:
Know your open source code. 11-15 - Steve Mansfield-Devine:
Creating security operations centres that work. 15-18 - Cricket Liu:
Actively boosting network security with passive DNS. 18-20
Volume 2016, Number 6, June 2016
- Colin Tankard:
What the GDPR means for businesses. 5-8 - Mark Hall:
Why people are key to cyber-security. 9-10 - Steve Mansfield-Devine:
The battle for privacy. 11-15 - Sameer Dixit:
Holding the fort: a business case for testing security. 16-18 - Paul German:
The SIP security fallacy. 18-20
Volume 2016, Number 7, July 2016
- Malcolm Murphy:
No place to hide as DNS comes under attack. 5-7 - Michael Hack:
The implications of Apple's battle with the FBI. 8-10 - Don Bush:
How data breaches lead to fraud. 11-13 - Steve Mansfield-Devine:
Securing small and medium-size businesses. 14-20
Volume 2016, Number 8, August 2016
- Matt Eddolls:
Making cybercrime prevention the highest priority. 5-8 - Paul German:
Face the facts - your organisation will be breached. 9-10 - Ben Rafferty:
Dangerous skills gap leaves organisations vulnerable. 11-13 - Cath Everett:
Should encryption software be banned? 14-17 - Duncan Hughes:
Silent risk: new incarnations of longstanding threats. 17-20
Volume 2016, Number 9, September 2016
- Ross Brewer:
Ransomware attacks: detection, prevention and cure. 5-9 - Marc Sollars:
Risk-based security: staff can play the defining role in securing assets. 9-12 - Adrian Crawley:
Hiring hackers. 13-15 - Phil Burdette:
Timeline of an attack. 16-17 - Hongwen Zhang:
How to disinfect and secure the Internet of Things. 18-20
Volume 2016, Number 10, October 2016
- Michael Buratowski:
The DNC server breach: who did it and what does it mean? 5-7 - Steve Mansfield-Devine:
Ransomware: taking businesses hostage. 8-17 - Colin Tankard:
Smart buildings need joined-up security. 20
Volume 2016, Number 11, November 2016
- Mike Fenton:
Restoring executive confidence: Red Team operations. 5-7 - Steve Mansfield-Devine:
DDoS goes mainstream: how headline-grabbing attacks could make this threat an organisation's biggest nightmare. 7-13 - Patrick Snyder:
Playing hackers at their own game. 14-16 - David Higgins:
Anatomy of an attack: 'lights out' in Ukraine. 17-19 - Karen Renaud
:
No, users are not irrational. 20
Volume 2016, Number 12, December 2016
- Mike Pittenger:
Addressing the security challenges of using containers. 5-8 - Sameer Dixit:
Opportunity vs risk with the Internet of Things. 8-10 - Steve Mansfield-Devine:
Data classification: keeping track of your most precious asset. 10-15 - Mathias Wagner:
The hard truth about hardware in cyber-security: it's more important. 16-19 - Colin Tankard:
The danger within. 20

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.