default search action
Network Security, Volume 2022
Volume 2022, Number 1, 2022
- Anurag Gurtu:
How AI will transform the cyber security industry. - ThreatWatch.
- Fabian Libeau:
Bulletproof hosting and the Magecart threat. - Charles Marrow:
Agricultural robot wars. - Probable Russian attacks against Ukraine.
- News in Brief.
- Eric Chambareau:
Deceptive security to protect your business. - UK launches first cyber security strategy for government.
- Tom McVey:
Staying safe during holiday seasons. - Blueliv: Follow the money.
- Javier Perez:
Using open source software securely.
Volume 2022, Number 2, 2022
- Russia breaches US defence contractors.
- Milad Aslaner:
Air-gapped networks: the myth and the reality. - Veracode: State of Software Security.
- Marc Burnard:
The evolving threat from China. - News in Brief.
- Colin Tankard:
Strength through simulation. - News Corp targeted by "foreign government".
- Threatwatch.
- Phil Chapman:
The security implications of working-from-anywhere. - Tom McVey:
Ransomware recap: Learning from 2021. - European oil facilities attacked.
- Scott Davidson:
Is energy the weak link in the UK's critical national infrastructure?
Volume 2022, Number 3, 2022
- Vyron Kampourakis, Georgios Kambourakis, Efstratios Chatzoglou, Christos D. Zaroliagis:
Revisiting man-in-the-middle attacks against HTTPS. - Guido Grillenmeier:
Ransomware - one of the biggest threats facing enterprises today. - Karen Renaud:
D-F of cyber security. - Nils Gerhardt:
How to plan for a post-quantum security ecosystem. - Tom McVey:
The 'need to know' of highly evasive adaptive threats. - The Art of Attack.
Volume 2022, Number 4, 2022
- Max Smith-Creasey, Steven Furnell, Muttukrishnan Rajarajan:
Continuous authentication for IoT smart home environments. - Elad Sherf:
The importance of cyber security in journalism. - Gio Cozzolino:
The state of cyber resilience. - Tom McVey:
Dealing with highly evasive adaptive threats.
Volume 2022, Number 5, 2022
- Tom McVey:
The challenges of Log4j - and how to solve them. - Andrew Cooke:
Incident response: test, don't improvise. - Michael Eckel, Tom Laffey:
Virtualised network security is not a one-size-fits-all approach. - Michael Wood:
Safeguard the future of your network. - Gary Archer:
Salvaging security for speedy single-page applications. - Yoann Delomier:
Securing industrial environments.
Volume 2022, Number 6, 2022
- Colin Tankard:
The case for threat modelling. - Scot Sturges:
The great security convergence: joining physical devices and cyber security. - Nathan Howe:
Security service edge: choosing the right solution. - Bharathasimha Reddy D., Srilekha Talluri, Ruthvik Reddy, Amit Nagal, Aditya K. Sood:
DGAs die hard: detecting malicious domains using AI.
Volume 2022, Number 7, 2022
- Jonas Iggbom:
Zero-trust architecture is creating a passwordless society. - Gemma Moore:
Pen testing vs red teaming. - Anthony Ricci:
The biggest challenges of manually managing PKI certificates. - Gabriela Ahmadi-Assalemi, Haider M. Al-Khateeb, Amar Aggoun:
Privacy-enhancing technologies in the design of digital twins for smart cities.
Volume 2022, Number 8, 2022
- Steve Mansfield-Devine:
IBM: Cost of a Data Breach. - Matias Madou:
Now is the time to strengthen cyber defences. - Assaf Morag:
Container attacks: a blast radius analysis. - Sachin Shah:
Industry 4.0: The security implications of operational technology. - Tom McVey:
Negotiating with ransomware gangs.
Volume 2022, Number 9, 2022
- Tom McVey:
Phishing campaign targets Japanese MICARD and Amex users. - headline.
- Colin Tankard:
Is anti-virus software up to the job? - Simon Mullis:
Driving best practice security in a hybrid working world. - Sujan Chegu, Gautam U. Reddy, Bharath S. Bhambore, Ka Adeab, Prasad B. Honnavalli, Sivaraman Eswaran:
An improved filter against injection attacks using regex and machine learning.
Volume 2022, Number 10, 2022
- Gemma Moore:
What you don't know can hurt you. - Simon Whitburn:
Driving the legal GRC agenda in a brave new world of compliance. - Dan Richings:
Rethinking endpoint management for the modern age. - Richard Staynings:
The threat from Russia continues to loom large. - Ashley Stephenson:
DDoS - does size matter?
Volume 2022, Number 11, 2022
- Tom McVey:
Talking template injection attacks. - Matias Madou:
Defence against the dark art of zero-day attacks. - Rob Allen:
Mission-critical data is more complex in a hybrid world. - James Griffiths:
Supply chain security - the biggest overlooked cyber risk. - Colin Tankard:
APIs - the hackers delight.
Volume 2022, Number 12, 2022
- Kevin Bocek:
Why businesses shouldn't rely on Istio's Mutual TLS. - Charlie Clark:
Analysis of a new AD vulnerability. - Maya Natarajan:
Strengthening cyber security with digital twins. - Ben Jacob:
How to deal with MFA bypass.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.