Volume 2023, Issue 12

Contents
Procurement's vital role in mitigating cyber security risks
CONRAD SNOVER


Governing cyber security in the maritime industry
PROF ROSSOUW VON SOLMS

Volume 2023, Issue 11

Contents
From zero trust to total trust in financial services
STEFAN AUERBACH


Redefining identity-first security with observability
WADE ELLERY


A security analysis of SOHO embedded systems
WOJCIECH WODO
MICHAL GANCARCZYK
JAKUB CZYSZCZONIK

Volume 2023, Issue 10

Contents
Improving national security through accountability
PIETER DANHIEUX


Six steps to dealing with a ransomware attack
CHRIS DIMITRIADIS


Assessing cyber security coverage in non-computing disciplines
STEVEN FURNELL
ELIANA STAVROU


The challenges of data sovereignty
SIMON PAMPLIN


Incident response: are alert levels now unmanageable?
BRIAN MARTIN

Volume 2023, Issue 9

Contents
Are we ready for the next WannaCry?
MARK CUNNINGHAM-DICKIE


To get the best value out of data, you have to protect it
JASON FOSTER


Adding AI to NDR in the face of current threats
JACQUES DE LA RIVIÈRE


How providers can help SMBs navigate the rising tide of attacks
DARREN WILLIAMS


The good and bad of generative AI
BERNARD MONTEL

Volume 2023, Issue 8

Contents
Don't blame people – fix the system
CHRISTINE BEJERASCO


A new age of cyber: transitioning from security to safety
GUY GOLAN


Coming to terms with DORA
DANIEL MORGAN


Good cyber security governance is crucial for us all
COREY NACHREINERS


They walk among us: AI-based social engineering attacks
SAMUDHRA SENDHIL


Think NIS2 isn't relevant to you? Think again
GRAHAM HAWKEY

Volume 2023, Issue 7

Contents
Busting the biggest myths about digital identities
JOHN CULLEN


Why cyber insurance has an image problem
SHARIF GARDNER


A single point of failure? AI and network detection and response
JACQUES DE LA RIVIÈRE


Social engineering the dispersed workforce
CHRISTIAN SCOTT


Information risk management – the gaps between expectation and reality
CHRIS VAUGHAN


SOAR isn't a silver bullet
TIM WALLEN

Volume 2023, Issue 6

Contents
Changing the law to deliver crypto asset certainty
AKBER DATOO
SIMON MAHARAJ


Normalising radical transparency in cyber security
DR NIKLAS HELLEMANN


Security maturity is a journey, not a destination
MATIAS MADOU


Is cyber security too hard?
STEVE MANSFIELD-DEVINE


New approaches to fighting fraud
FERGAL PARKINSON

Volume 2023, Issue 5

Contents
Consumer trust and perspectives on cyber security
CHRIS DIMITRIADIS


Are we smart enough for smart technology?
SAREENA HEER
SAMIAH ALGHAMDI
STEVEN FURNELL


Don't turn a blind eye to cyber security
FABIEN RECH


Looking back to the future
BERNARD MONTEL

Volume 2023, Issue 4

Contents
Cloud as a malware infiltration channel
RAY CANZANESE


Squeezing the security budget
STEVE MANSFIELD-DEVINE


Developing a shared SOC
MARTIN WALSHAM


The J-L of cyber security
KAREN RENAUD

Volume 2023, Issue 3

Contents
Getting ahead of the attackers
DAN GARCIA


Brace for an uptick in insider fraud
OMRI KLETTER


Now is the time to invest in cyber
MIRI MARCIANO


Why is zero trust so difficult?
PHIL ROBINSON


Cyber insurance is no longer optional
MARK WARREN

Volume 2023, Issue 2

Contents
Adversarial machine learning: the rise in AI-enabled crime
JAHNAVI SIVARAM
JIGISHA M NARRAIN
PRASAD HONNAVALLI
SIVARAMAN ESWARAN


How secure is your organisation?
HELEN MASTERS


Rethinking security with cloud native in mind
RANI OSNAT


The year of the business-driven CISO
TIM WALLEN


 

Volume 2023, Issue 1

Contents
Curbing modern cyberthreats
SAMIR DESAI


Understanding the complexities of operational technology security
ERIC ESCOBAR


A forensic method for investigating manipulated video recordings
ILKER KARA
CEREN KORKMAZ
ALIHAN KARATATAR
MURAT AYDOS


The perfect cyber storm – security budgets, skills shortages and automated attacks
PHIL ROBINSON

Volume 2022, Issue 12

Contents
Why do we silo cyber security when criminals don't?
GUY GOLAN


Deciphering Conti and the need for effective SOCs
SCOTT GOODWIN


The psychological problem with ransomware
BEC MCKEOWN


The threats to Jupyter Notebook
ASSAF MORAG

Volume 2022, Issue 11

Contents
Preventing ransomware – doing the impossible?
HENRY HARRISON


Securing the organisation by protecting the individual
KATIE PETRILLO


Minimising fraud in a post-Covid world
JAMES RICHARDSON


A new era of bank security challenges
MATT TENGWALL


Mind the gap between cyber security spend, budgets and awareness
ERIC BARNES

Volume 2022, Issue 10

Contents
Slow down and frown to improve phishing detection
PATRICIA NEVIN
KAREN RENAUD
GEORGE FINNEY


The rise of phishing: what your staff needs to know
Andrew Weaver


The importance of security for the crypto industry
MARC WILCZEK


The changing role of the chief compliance officer
SIMON WINCHESTER


Waking up to the encryption advantage
JON FIELDING

Volume 2022, Issue 9

Contents
Uncovering data relationships to tackle fraud
ALICIA FRAME


SASE and the future of IoT security
MARTIN GIESS


Using AI to combat fraud in the voice channel
AMIT GUPTA


Are cyber security breaches unavoidable?
PAUL O'ROURKE


The future of cyber security
DOMINIK SAMOCIUK

Volume 2022, Issue 8

Contents
How to maintain control in a regulated environment
MAT CLOTHIER


The growing need for digital document attestation
MOHAMMED SAHIB


Passwords: The cyber security lesson that was never learned?
STEVEN FURNELL


The G-I of cyber security
KAREN RENAUD

Volume 2022, Issue 7

Contents
Cyber security challenges in self-driving cars
AHMED REDHA MAHLOUS


Strategies for counteracting social engineering attacks
RUBIA FATIMA
AFFAN YASIN
LIN LIU
WANG JIANMIN


Why data belongs at the heart of the organisation
RAY PATHAK

Volume 2022, Issue 6

Contents
HEAT-wave – defining a new era of cyberthreats
JONATHAN LEE


Ensuring cyber resilience in a digital world
DENNIS MATTOON


Can PCI DSS 4.0 reverse the decline in compliance?
PHIL ROBINSON


Verizon: Data Breach Investigations Report
STEVE MANSFIELD-DEVINE