![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Network Security, Volume 2019
Volume 2019, Number 1, January 2019
- Gabe Perez:
A practical approach to securing IoT. 6-8 - Andrea Oliveri
, Filippo Lauria:
Sagishi: an undercover software agent for infiltrating IoT botnets. 9-14 - Gary Cox:
Managing the risks of shadow IoT. 14-17 - Roderick Hodgson:
Solving the security challenges of IoT with public key cryptography. 17-19 - Ian Goslin:
Know your enemy. 20
Volume 2019, Number 2, February 2019
- Robert Rutherford:
Internet of Things - striking the balance between competition and security. 6-8 - Sean Keef:
Using analytics-driven automation to target the biggest vulnerabilities. 8-11 - Adam Vincent:
Don't feed the phish: how to avoid phishing attacks. 11-14 - Phil Bindley:
Joining the dots: how to approach compliance and data governance. 14-16 - Simon Yeoman:
How secure are bare metal servers? 16-17 - Sean Newman:
Under the radar: the danger of stealthy DDoS attacks. 18-19 - Ganna Pogrebna
, Karen Renaud
, Boris Taratine:
The many faces of active cyber. 20
Volume 2019, Number 3, March 2019
- Dave Klein:
Micro-segmentation: securing complex cloud environments. 6-10 - Jesse Canada:
Is reputational damage worse than a regulator's fine? 11-12 - Greig Schofield:
Has your wifi left you wide open to cybercrime? 13-14 - Sam Haria:
The growth of the hide and seek botnet. 14-17 - Rory Duncan:
How to secure your supply chain. 18-19 - Colin Tankard:
IoT regulations: fact or fiction? 20
Volume 2019, Number 4, April 2019
- Daniel Goldberg:
Living with decade-old vulnerabilities in datacentre software. 6-8 - Nick Jewell:
The analytics lifecycle and the age of innovation. 8-11 - Sascha Giese:
The endpoint epidemic of IoT - just a bad dream? 11-12 - Sean Herbert:
Preventing software from opening doors to the network. 13-15 - Alex Mathews:
What can machine learning do for information security? 15-17 - Nick Boughton:
Protecting infrastructure from cyber attack. 18-19 - Dave Spence:
The non-functional requirement fallacy. 20
Volume 2019, Number 5, May 2019
- Omar Yaacoubi:
The rise of encrypted malware. 6-9 - Scott Gordon:
A matter of trust. 9-11 - Van Linh Nguyen
, Po-Ching Lin, Ren-Hung Hwang
:
Web attacks: defeating monetisation attempts. 11-19 - Ian Goslin:
Cyber extortion is threatening Industry 4.0. 20
Volume 2019, Number 6, June 2019
- SophosLabs Research Team:
Emotet exposed: looking inside highly destructive malware. 6-11 - Nick Boughton:
Protecting the world of connected devices. 11-13 - Jason Macy:
Product vs toolkit: API and IAM security. 13-15 - Akashdeep Bhardwaj
, Sam Goundar
:
A framework for effective threat hunting. 15-19 - Karen Renaud
, Verena Zimmermann:
Encouraging password manager use. 20
Volume 2019, Number 7, July 2019
- Michael Roytman, Jay Jacobs:
The complexity of prioritising patching. 6-9 - Sean Herbert:
Why IIoT should make businesses rethink security. 9-11 - Paul Breitbarth:
The impact of GDPR one year on. 11-13 - Peter Barker:
Visual hacking - why it matters and how to prevent it. 14-17 - Jan Oetjen:
Using artificial intelligence in the fight against spam. 17-19 - Colin Tankard:
Why you need Cyber Essentials. 20
Volume 2019, Number 8, August 2019
- Keenan Skelly:
It's a war out there: why malicious hackers are beating businesses to the punch - and what we can do about it. 6-8 - Dawood Ghalaieny:
Achieving IoT nirvana by protecting cellular networks. 8-12 - Mike O'Malley:
Securing the future of AgTech. 12-14 - Thorsten Kurpjuhn:
Demystifying the role of AI for better network security. 14-17 - Adrian Taylor:
Decrypting SSL traffic: best practices for security, compliance and productivity. 17-19 - Dave Spence:
Response in the cloud. 20
Volume 2019, Number 9, September 2019
- Spencer Young:
Automated systems only: why CISOs should switch off their dumb machines. 6-8 - Roger Grimes:
The many ways to hack 2FA. 8-13 - Andy Baldin:
Best practices for fighting the fileless threat. 13-15 - Paul Walker:
Why do PAM projects fail? 15-18 - Charlene Bunting:
Cloud security: how to protect critical data and stay productive. 18-19 - Richard Goodall:
The ideal industrial SOC. 20
Volume 2019, Number 10, October 2019
- Ian Heritage:
Protecting Industry 4.0: challenges and solutions as IT, OT and IP converge. 6-9 - Steve Mansfield-Devine:
The state of operational technology security. 9-13 - Akashdeep Bhardwaj
, Vinay Avasthi, Sam Goundar
:
Cyber security attacks on robotic platforms. 13-19 - Colin Tankard:
Goodbye SIEM, hello SOARX. 20
Volume 2019, Number 11, November 2019
- Chris Knauer:
How contact centres can leave businesses exposed to cybercrime. 6-9 - Tom Stitt:
Office walls and roadblocks: how workflows and terminology get in the way of visibility. 9-13 - Stu Homan:
The importance of domains to security management. 13-15 - Azeem Aleem:
Treading water: why organisations are making no progress on cyber security. 15-18 - Nathalie Künneke-Trenaman:
RPKI and the future of routing security. 18-19 - Karen Renaud
, Marc J. Dupuis:
Should we scare people into behaving securely? 20
Volume 2019, Number 12, December 2019
- Tim Callan, Chris Bailey:
Changes to extended validation indicators put users at risk. 6-8 - Steve Thompson:
Apprenticeships as the answer to closing the cyber skills gap. 9-11 - Mouhammd Alkasassbeh
, Tariq Khairallah:
Winning tactics with DNS tunnelling. 12-19 - Dave Spence:
Resilience in the supply chain. 20
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.