default search action
Network Security, Volume 2023
Volume 2023, Number 1, 2023
- Gemma Moore:
Awareness and layered defences. - Aditya K. Sood, Michael Wiley:
Cloud databases: a breeding ground for ransomware. - Bryan Ross:
The law that is changing the telco sector for the better. - Jonathan Lee:
Responding to worsening web browser attacks.
Volume 2023, Number 2, 2023
- Nigel Jones:
Guilty of hiding a data breach. - Luke Kenny:
Preparing for crisis: are you ready to be attacked? - Tom McVey:
Tracing template injection attacks to North Korea. - Colin Tankard:
PKI - friend or foe? - Thomas Segura:
The nightmare of hard-coded credentials.
Volume 2023, Number 3, 2023
- Dmitry Bestuzhev:
NewsPenguin threatens Pakistan. - Steve Mansfield-Devine:
Do you have too much security? - Tom McVey:
Is ChatGPT really a cyberthreat?
Volume 2023, Number 4, 2023
- Alan Stewart-Brown:
Secure and resilient remote access is what really matters. - John Pescatore:
Tackling new and emerging threats. - Gemma Moore:
The right balance between controls and teams. - Steve Mansfield-Devine:
Weaponising ChatGPT.
Volume 2023, Number 5, 2023
- Luke Potter:
Has Twitter made a big mistake with 2FA? - Gus Malezis:
Digital identity: healthcare's path forward. - Sylvain Cortes:
How the pharma industry can reinvent vulnerability management. - Tom McVey:
Analysing four recent IcedID malware campaigns. - Bharathasimha Reddy, Amit Nagal, Aditya K. Sood, Ruthvik Reddy:
Enhancing cyber security at scale with ML/AI frameworks.
Volume 2023, Number 6, 2023
- Cengiz Tuztas:
Where identity governance really belongs. - Colin Tankard:
No mystery to encryption. - Mohamad Ibrahim, Nader Sohrabi Safa:
Vulnerabilities and risk in smart vehicle automatic parking assist systems. - Chrystal Taylor:
Improving your company's cyber security training. - Tom McVey:
Malware delivery is evolving through password-protected files.
Volume 2023, Number 7, 2023
- Paul Caron:
Bridging the cyber skills gap. - Tom McVey:
XeGroup's evolving attack methods. - Tom Egglestone:
Protecting the UK's national infrastructure. - Henry Harrison:
Why zero trust should start at the endpoint. - Gemma Moore:
Removing passwords doesn't remove risk. - Tyler Moffitt:
How SMBs can defeat the threat of ransomware.
Volume 2023, Number 8, 2023
- Mark Hughes:
The growing cyberthreat to critical national infrastructure. - Karen Renaud:
The M-P of cyber security. - Aditya K. Sood:
Defensive cyber security: continuous controls enforcement and infrastructure hygiene. - Sohail Iqbal:
Remote working is here to stay, but security issues persist. - Colin Sheppard:
The shadow of 2022 is still shaping cyberthreats.
Volume 2023, Number 9, 2023
- Daniel Pearson:
Five ways to use AI to prevent cyber attacks. - Suleyman Ozarslan:
Top of the TTPs: Malware's most common tactics, techniques and procedures. - Scott Weedon:
Generative AI: security implications for business automation. - Anat Garty:
The digital frontier: defending the public sector against cyberthreats. - Colin Tankard:
Is your email security doing what it claims? - Tom McVey:
Ramping up the response to browser-based attacks.
Volume 2023, Number 10, 2023
- Deepika Chauhan:
Digital trust is core to our relationship with technology. - Tom McVey:
Best practices for combatting malvertising attacks. - Brett Raybould:
ChatGPT: The potential is clear, but what are the risks? - Frederik Mennes:
Digital identity - creating a unified system. - Paul Brucciani:
Embracing an outcome-based approach to cyber security. - Gemma Moore:
The importance of practice for cyber security incident response.
Volume 2023, Number 11, 2023
- Steve Kenny:
The NIS 2 Directive: securing critical assets. - Mark Jow:
Encryption blind spots: shining a light on cloud network traffic. - Paul Baird:
Improving risk management - combining security and cyber insurance practices. - Graham Hosking:
How to assess the impact of generative artificial intelligence.
Volume 2023, Number 12, 2023
- Jeremy Whittingham:
Safeguarding legacy equipment. - Brian Lonergan:
Domain phishing: staying a step ahead of the threats. - Michael Isbitski:
Can vulnerability disclosure be timely, detailed and coordinated? - Akber Datoo, Jake Pope:
AI - bedazzled by its allure, blinded to its risks. - Brian Trzupek:
How to strengthen the software supply chain.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.