default search action
Network Security, Volume 2020
Volume 2020, Number 1, January 2020
- Roy Reynolds:
It's time to rethink DDoS protection. 6-8 - Andres Andreu:
Operational technology security - a data perspective. 8-13 - Scott Gordon:
Securing workers beyond the perimeter. 14-16 - Guy Bunker:
Targeted cyber attacks: how to mitigate the increasing risk. 17-19 - Colin Tankard:
The power of voice. 20
Volume 2020, Number 2, February 2020
- Cindy Blake:
Reducing risk with end-to-end application security automation. 6-8 - Pranshu Bajpai, Richard J. Enbody:
Dissecting .NET ransomware: key generation, encryption and operation. 8-14 - Akashdeep Bhardwaj, Sam Goundar:
Keyloggers: silent cyber security weapons. 14-19 - Kate MacMillan:
Signs of things to come? 20
Volume 2020, Number 3, March 2020
- Roy Reynolds:
The four biggest malware threats to UK businesses. 6-8 - Yessine Borchani:
Advanced malicious beaconing detection through AI. 8-14 - Colby Dyess:
Maintaining a balance between agility and security in the cloud. 14-17 - Pascal Geenens:
How worried should you be about nation-state attacks? 17-19 - Karen Renaud:
Strong passwords can't keep children safe. 20
Volume 2020, Number 4, April 2020
- Terry Ray:
DDoS defence: new tactics for a rising shadow industry. 6-7 - Phil Chapman:
Are your IT staff ready for the pandemic-driven insider threat? 8-11 - Cary Wright:
Essentials for selecting a network monitoring tool. 11-14 - Simon Kelf:
The security risks created by cloud migration and how to overcome them. 14-16 - David Higgins:
Innovation and risk walk hand-in-hand with 5G and IoT. 16-18 - Alyn Hockey:
Uncovering the cyber security challenges in healthcare. 18-19 - David Fox:
Losing the human touch. 20
Volume 2020, Number 5, May 2020
- Florian Malecki:
Optimising storage processes to reduce the risk of ransomware. 6-8 - Meryem Amar, Bouabid El Ouahidi:
Hybrid intrusion detection system using machine learning. 8-19 - Colin Tankard:
Pandemic underpins need for SOAR. 20
Volume 2020, Number 6, June 2020
- Leila Powell:
How data can be the lingua franca for security and IT. 6-7 - Paul Hampton:
Keeping a secure hold on data through modern electronic content management. 8-11 - Gus Evangelakos:
Keeping critical assets safe when teleworking is the new norm. 11-14 - Ben Bulpett:
Safeguarding against the insider threat. 14-17 - Thomas Deighton, Michael Wakefield:
Keep security top of mind when moving into the cloud. 17-19 - Kate MacMillan:
Trusting the CISO. 20
Volume 2020, Number 7, July 2020
- Rod Cope:
Strong security starts with software development. 6-9 - Martin Jartelius:
The 2020 Data Breach Investigations Report - a CSO's perspective. 9-12 - Mieng Lim:
Avoiding the most common vulnerability-management pitfalls. 12-14 - Simon Wood:
Adhering to privacy by design with identity-as-a-service. 14-17 - Dale Murray:
Open source and security: why transparency now equals strength. 17-19 - Karen Renaud, Zinaida Benenson, Daniela Oliveira:
Balancing resistance and resilience. 20
Volume 2020, Number 8, August 2020
- Mark Rodbert:
Why organisational readiness is vital in the fight against insider threats. 7-9 - Dave Waterson:
Managing endpoints, the weakest link in the security chain. 9-13 - Ion-Alexandru Secara:
Zoombombing - the end-to-end fallacy. 13-17 - Rory Duncan:
What does 'secure by design' actually mean? 18-19 - David Fox:
Dealing with technical debt. 20
Volume 2020, Number 9, September 2020
- Mike Campfield:
The problem with (most) network detection and response. 6-9 - Fabio Cavaliere, John Preuß Mattsson, Ben Smeets:
The security implications of quantum cryptography and quantum computing. 9-15 - Israel Barak:
Critical infrastructure under attack: lessons from a honeypot. 16-17 - Michael Eckel, Tom Laffey:
Ensuring the integrity and security of network equipment is critical in the fight against cyber attacks. 18-19 - Andrew Cooke:
A unique year for cyber security. 20
Volume 2020, Number 10, October 2020
- Assaf Morag:
Exploitable hosts used in cloud native cyber attacks. 6-10 - Nadav Erez:
How threat actors abuse ICS-specific file types. 10-13 - Tom Hofmann:
How organisations can ethically negotiate ransomware payments. 13-17 - Robert Meyers:
Data highway and the digital transformation: arguments for secure, centralised log management. 17-19 - Colin Tankard:
Remote working reset now required. 20
Volume 2020, Number 11, November 2020
- Amy Hodler:
Can graphs mitigate against coronavirus-related cybercrime? 6-8 - Andy Still:
Bot mitigation - how gapsin understanding and ownership are exposingbusinesses to greater threats. 8-11 - Armin Wasicek:
The future of 5G smart home network security is micro-segmentation. 11-13 - Brian Trzupek:
How DIY PKI often negates the promise of public key encryption. 14-17 - René Seifert:
Digital identities - self-sovereignty and blockchain are the keys to success. 17-19 - Karen Renaud, Verena Zimmermann:
How to nudge in cyber security. 20
Volume 2020, Number 12, December 2020
- Michael Wood:
How SASE is defining the future of network security. 6-8 - Mark Sangster:
When it comes to cyber security, ignorance isn't bliss - it's negligence. 8-12 - Steve Mansfield-Devine:
Nation-state attacks: the escalating menace. 12-17 - Gus Evangelakos:
Where conventional security control validation falls short when evaluating organisational threats. 18-19 - Paul Stone:
Securing Windows networks against WSUS attacks. 20
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.