


default search action
Network Security, Volume 2018
Volume 2018, Number 1, January 2018
- Jeff Luszcz
:
Apache Struts 2: how technical and development gaps caused the Equifax Breach. 5-8 - Olivier Boireau:
Securing the blockchain against hackers. 8-11 - Dave Nicholson:
Blurring the boundaries between networking and IT security. 11-13 - Fadi Farha
, Hongsong Chen:
Mitigating replay attacks with ZigBee solutions. 13-19 - Colin Tankard:
Tackling push payment scams. 20
Volume 2018, Number 2, February 2018
- James Wickes:
CCTV: an open door into enterprise and national infrastructure. 5-8 - Saad Al-Azzam, Ahmad Abdel-Aziz Sharieh
, Azzam Sleit
, Nedaa Al-Azzam:
Securing robot communication using packet encryption distribution. 8-14 - Steve Mansfield-Devine:
Open source and the Internet of Things. 14-19 - Karen Renaud
, Lynsay A. Shepherd
:
GDPR: its time has come. 20
Volume 2018, Number 3, March 2018
- Barry Scott:
How a zero trust approach can help to secure your AWS environment. 5-8 - Kirill Shipulin:
We need to talk about IDS signatures. 8-13 - Yassine Ayrour, Amine Raji, Mahmoud Nassar
:
Modelling cyber-attacks: a survey study. 13-19 - Colin Tankard:
The threat of fileless trojans. 20
Volume 2018, Number 4, April 2018
- Tim Mackey:
Building open source security into agile application builds. 5-8 - Pranshu Bajpai
, Aditya K. Sood, Richard J. Enbody:
The art of mapping IoT devices in networks. 8-15 - Akashdeep Bhardwaj
, Sam Goundar
:
Reducing the threat surface to minimise the impact of cyber-attacks. 15-19 - Tim Erridge:
True colours of red teaming. 20
Volume 2018, Number 5, May 2018
- Lee James:
Making cyber-security a strategic business priority. 6-8 - Michael Aminzade:
Confidentiality, integrity and availability - finding a balanced IT framework. 9-11 - Greg Sim:
Defending against the malware flood. 12-13 - Steve Mansfield-Devine:
The intelligent way to protect complex environments. 13-17 - Jonathan Wilkins:
Is artificial intelligence a help or hindrance? 18-19 - Karen Renaud
:
Cooking up security awareness & training. 20
Volume 2018, Number 6, June 2018
- Chris Townsley:
Are businesses getting complacent when it comes to DDoS mitigation? 6-9 - Mike Simmonds:
Instilling a culture of data security throughout the organisation. 9-12 - Jason Macy:
How to build a secure API gateway. 12-14 - Javid Khan:
The need for continuous compliance. 14-15 - Steve Mansfield-Devine:
Friendly fire: how penetration testing can reduce your risk. 16-19 - Colin Tankard:
Streamlining data discovery. 20
Volume 2018, Number 7, July 2018
- Phil Beecher:
Enterprise-grade networks: the answer to IoT security challenges. 6-9 - Colin Dennis:
Why is patch management necessary? 9-13 - Anthony Chadd:
DDoS attacks: past, present and future. 13-15 - Steve Mansfield-Devine:
DevOps: finding room for security. 15-20
Volume 2018, Number 8, August 2018
- Mike Mason:
Overcoming the risks of privileged user abuse in Salesforce. 6-8 - Tracey Caldwell:
Plugging IT/OT vulnerabilities - part 1. 9-14 - Steve Mansfield-Devine:
Knowing what you have: the road to effective data discovery. 15-19 - Oliver Fay:
BEC reality check. 20
Volume 2018, Number 9, September 2018
- Jason Macy:
API security: whose job is it anyway? 6-9 - Tracey Caldwell:
Plugging IT/OT vulnerabilities - part 2. 10-15 - Keegan Keplinger:
Is quantum computing becoming relevant to cyber-security? 16-19 - Karen Renaud
, Verena Zimmermann:
A user by any other name. 20
Volume 2018, Number 10, October 2018
- Ronald Sens:
Be ready to fight new 5G vulnerabilities. 6-7 - Marco Hogewoning:
IoT and regulation - striking the right balance. 8-10 - Marc Sollars:
Love and marriage: why security and SD-WAN need to go together. 10-12 - Benedict McKenna:
Measuring cyber-risk. 12-14 - Steve Mansfield-Devine:
Hacking democracy: abusing the Internet for political gain. 15-19 - Colin Tankard:
How trustworthy is AI? 20
Volume 2018, Number 11, November 2018
- Jack Bedell-Pearce:
Safe digital transformation for SMEs. 6-7 - Steve Roberts:
Learning lessons from data breaches. 8-11 - Nick Claxson:
Securing VoIP: encrypting today's digital telephony systems. 11-13 - Paul Timms:
Business continuity and disaster recovery - advice for best practice. 13-14 - Steve Mansfield-Devine:
Nation-state attacks: the start of a new Cold War? 15-19 - Ranulf Green:
Pen-testing the cloud. 20
Volume 2018, Number 12, December 2018
- Andy Baldin:
Securing the weak spots. 6-8 - Tim Stone:
Protecting connected transportation networks. 8-10 - R. V. Raghu:
The many dimensions of successful IoT deployment. 10-15 - Steve Mansfield-Devine:
Getting to grips with IoT. 15-19 - Colin Tankard:
A layered approach to authentication. 20

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.