default search action
Network Security, Volume 2017
Volume 2017, Number 1, January 2017
- Jamie Graves:
Data flow management: why and how. 5-6 - Steve Mansfield-Devine:
Open source software: determining the real risk posed by vulnerabilities. 7-12 - Michael Wood:
How to make SD-WAN secure. 12-14 - Paul German:
Is your Session Border Controller providing a false sense of security? 14-16 - Bill Welch:
Exploiting the weaknesses of SS7. 17-19 - Karen Renaud:
Webcam covering phenomenon. 20
Volume 2017, Number 2, February 2017
- Andy Lilly:
IMSI catchers: hacking mobile communications. 5-7 - Jack Bedell-Pearce:
When big data and Brexit collide. 8-9 - Jamie Graves:
What is intellectual property and how do you protect it? 9-11 - Gert-Jan Schenk:
Retailers must focus on the growing cyberthreat landscape. 12-13 - Steve Mansfield-Devine:
A process of defence - securing industrial control systems. 14-19 - Tim Erridge:
Optimising risk management. 20
Volume 2017, Number 3, March 2017
- Colin Tankard:
Encryption as the cornerstone of big data security. 5-7 - Lewis Henderson:
National infrastructure - the next step for seasoned hackers. 8-10 - Vincent Smyth:
Software vulnerability management: how intelligence helps reduce the risk. 10-12 - Nick Hawkins:
Why communication is vital during a cyber-attack. 12-14 - Tim Ring:
The Russians are coming! Are security firms over-hyping the hacker threat? 15-18 - Andy Green:
Ransomware and the GDPR. 18-19 - Colin Tankard:
The Firewall: The eSignature comes of age. 20
Volume 2017, Number 4, April 2017
- SM-D:
Hiding Behind the Keyboard. 4 - Leon Adato:
Monitoring and automation: it's easier than you think. 5-7 - Steve Mansfield-Devine:
Fileless attacks: compromising targets without malware. 7-11 - Alan Zeichick:
Enabling innovation by opening up the network. 12-14 - Rohit Talwar, April Koury:
Artificial intelligence - the next frontier in IT security? 14-17 - Mark Hickman:
The threat from inside. 18-19 - Karen Renaud:
Facts do not change minds. 20
Volume 2017, Number 5, May 2017
- SM-D:
Practical Packet Analysis Chris Sanders. 4 - SM-D:
We Know All About You Rhodri Jeffreys-Jones. 4 - Sean Newman:
Service providers: the gatekeepers of Internet security. 5-7 - Jacob Gajek:
Macro malware: dissecting a malicious Word document. 8-13 - Steve Mansfield-Devine:
Threat hunting: assuming the worst to strengthen resilience. 13-17 - Travis Farral:
The attribution problem with information security attacks. 17-19 - Tim Erridge:
Gaining strength. 20
Volume 2017, Number 6, June 2017
- Daniel Shugrue:
Fighting application threats with cloud-based WAFs. 5-8 - Jesper Zerlang:
GDPR: a milestone in convergence for cyber-security and compliance. 8-11 - Jay Botelho:
How automating data collection can improve cyber-security. 11-13 - Steve Mansfield-Devine:
Leaks and ransoms - the key threats to healthcare organisations. 14-19 - Colin Tankard:
Securing emails. 20
Volume 2017, Number 7, July 2017
- Simon Parkinson:
Use of access control to minimise ransomware impact. 5-8 - Michael Wood:
Top requirements on the SD-WAN security checklist. 9-11 - Mark Taylor, Denis Reilly, Brett Lempereur:
An access control management protocol for Internet of Things devices. 11-17 - Malcolm Murphy:
The Internet of Things and the threat it poses to DNS. 17-19 - Karen Renaud:
It makes you Wanna Cry. 20
Volume 2017, Number 8, August 2017
- Jeff Luszcz:
How maverick developers can create risk in the software and IoT supply chain. 5-7 - Eileen Haggerty:
Healthcare and digital transformation. 7-11 - Tom Major:
Weaponising threat intelligence data. 11-13 - Paul German:
Time to bury dedicated hardware-based security solutions. 13-15 - Steve Mansfield-Devine:
Adapting to the disappearing perimeter. 15-19 - Tim Erridge:
Good will hunting. 20
Volume 2017, Number 9, September 2017
- Travis Farral:
Nation-state attacks: practical defences against advanced adversaries. 5-7 - Jon Condra:
Assessing nation state threats. 8-10 - Adam Vincent:
State-sponsored hackers: the new normal for business. 10-12 - Nick Robinson, Keith Martin:
Distributed denial of government: the Estonian Data Embassy Initiative. 13-16 - Phil Beckett:
Data and IP are the new nuclear: facing up to state-sponsored threats. 17-19 - Colin Tankard:
Who are the attackers? 20
Volume 2017, Number 10, October 2017
- Eric Lundbohm:
Understanding nation-state attacks. 5-8 - John Bambenek:
Nation-state attacks: the new normal. 8-10 - Brian Laing:
Cyber global warming: six steps towards meltdown. 11-13 - Steve Mansfield-Devine:
Weaponising the Internet of Things. 13-19 - Karen Renaud, Gareth Renaud:
To phish, or not to phish... 20
Volume 2017, Number 11, November 2017
- Chris Steffen:
Should jump box servers be consigned to history? 5-6 - Nick Thompson:
Putting security at the heart of app development. 7-8 - Akashdeep Bhardwaj, Sam Goundar:
Security challenges for cloud-based email infrastructure. 8-15 - Steve Mansfield-Devine:
Going critical: attacks against national infrastructure. 16-19 - Colin Tankard:
BYOE: New kid on the block. 20
Volume 2017, Number 12, December 2017
- Steven Furnell, Ismini Vasileiou:
Security education and awareness: just let them burn? 5-9 - Filippo Lauria:
How to footprint, report and remotely secure compromised IoT devices. 10-16 - Steve Mansfield-Devine:
The right response: how organisations should react to security incidents. 16-19 - Tim Erridge:
A framework for threats. 20
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.