Volume 2023, Issue 1
Contents
Curbing modern cyberthreats
SAMIR DESAI
Understanding the complexities of operational technology security
ERIC ESCOBAR
A forensic method for investigating manipulated video recordings
ILKER KARA
CEREN KORKMAZ
ALIHAN KARATATAR
MURAT AYDOS
The perfect cyber storm – security budgets, skills shortages and automated attacks
PHIL ROBINSON
Volume 2022, Issue 12
Contents
Why do we silo cyber security when criminals don't?
GUY GOLAN
Deciphering Conti and the need for effective SOCs
SCOTT GOODWIN
The psychological problem with ransomware
BEC MCKEOWN
The threats to Jupyter Notebook
ASSAF MORAG
Volume 2022, Issue 11
Contents
Preventing ransomware – doing the impossible?
HENRY HARRISON
Securing the organisation by protecting the individual
KATIE PETRILLO
Minimising fraud in a post-Covid world
JAMES RICHARDSON
A new era of bank security challenges
MATT TENGWALL
Mind the gap between cyber security spend, budgets and awareness
ERIC BARNES
Volume 2022, Issue 10
Contents
Slow down and frown to improve phishing detection
PATRICIA NEVIN
KAREN RENAUD
GEORGE FINNEY
The rise of phishing: what your staff needs to know
Andrew Weaver
The importance of security for the crypto industry
MARC WILCZEK
The changing role of the chief compliance officer
SIMON WINCHESTER
Waking up to the encryption advantage
JON FIELDING
Volume 2022, Issue 9
Contents
Uncovering data relationships to tackle fraud
ALICIA FRAME
SASE and the future of IoT security
MARTIN GIESS
Using AI to combat fraud in the voice channel
AMIT GUPTA
Are cyber security breaches unavoidable?
PAUL O'ROURKE
The future of cyber security
DOMINIK SAMOCIUK
Volume 2022, Issue 8
Contents
How to maintain control in a regulated environment
MAT CLOTHIER
The growing need for digital document attestation
MOHAMMED SAHIB
Passwords: The cyber security lesson that was never learned?
STEVEN FURNELL
The G-I of cyber security
KAREN RENAUD
Volume 2022, Issue 7
Contents
Cyber security challenges in self-driving cars
AHMED REDHA MAHLOUS
Strategies for counteracting social engineering attacks
RUBIA FATIMA
AFFAN YASIN
LIN LIU
WANG JIANMIN
Why data belongs at the heart of the organisation
RAY PATHAK
Volume 2022, Issue 6
Contents
HEAT-wave – defining a new era of cyberthreats
JONATHAN LEE
Ensuring cyber resilience in a digital world
DENNIS MATTOON
Can PCI DSS 4.0 reverse the decline in compliance?
PHIL ROBINSON
Verizon: Data Breach Investigations Report
STEVE MANSFIELD-DEVINE
Volume 2022, Issue 5
Contents
Encrypted DNS: The good, the bad and the moot
GEORGIOS KAMBOURAKIS
How SMEs can prevent third-party vendor data breaches
OLIVER PINSON-ROXBURGH
Sophos: The State of Ransomware 2022
STEVE MANSFIELD-DEVINE
Cloud – buzzword or business plan?
PATRICK WRAGG
Volume 2022, Issue 4
Contents
The who, what, why and when of data protection impact assessments
NIGEL JONES
RATs in the cloud: gaining access to container environments
ASSAF MORAG
Securing the API economy
TRAVIS SPENCER
The age of holistic consolidation and automation of cyber security
TIM WALLEN
Cyber Security Breaches Survey 2022
STEVE MANSFIELD-DEVINE
How government bodies can lead the field on data management and privacy
JON FIELDING
Volume 2022, Issue 3
Contents
Assessing cyber security consumer support from technology retailers
BIAR KOSHNAW
STEVEN FURNELL
Identifying the changing faces of international fraudsters
SAM RANIERI
How tech hiring is changing
GRAHAM HUNTER
Electronic-signatures – elegant solution or operational risk?
JASON PUGH
Is the GDPR a ticking time bomb for companies?
MUNDEEP NAYYAR
Volume 2022, Issue 2
Contents
TXOne Networks: 2021 Cyber security Report
Preparing for data reclaim requests from online shopping
GAL RINGEL
Building successful software security initiatives
JACOB EWERS
Managing a remote workforce's IT
SCOTT DAVIDSON
The emergence of data governance as a service
MICHAEL QUEENAN
Why we need more women in cyber security
ANDREA BABBS
The modern CISO: where marketing meets security
ALICE SHORT
ROLAND CARANDANG
Volume 2022, Issue 1
Contents
Security should shift left too
BERNARD MONTEL
Better security through diversity – a personal perspective
LEILA IRANMANESH
Identity verification in a post-pandemic world
ROBERT PRIGGE
Life after Emotet – the lessons learned
GEORGE GLASS
Embracing security transformation with MDR
MARTIN RILEY
Securing the blockchain for fintech companies
MARIO GALATOVIC
Volume 2021, Issue 12
Contents
NEWS
Supply chain attack on Kaseya compromises hundreds of firms 1
EC to launch joint cyber unit 3
FEATURES
Cyber security: what are we talking about? 6
Read the digital fingerprints: log analysis for digital forensics and security 11
The hardware destruction issue 17
REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20
Volume 2021, Issue 11
Contents
NEWS
Supply chain attack on Kaseya compromises hundreds of firms 1
EC to launch joint cyber unit 3
FEATURES
Cyber security: what are we talking about? 6
Read the digital fingerprints: log analysis for digital forensics and security 11
The hardware destruction issue 17
REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20
Volume 2021, Issue 10
Contents
NEWS
Supply chain attack on Kaseya compromises hundreds of firms 1
EC to launch joint cyber unit 3
FEATURES
Cyber security: what are we talking about? 6
Read the digital fingerprints: log analysis for digital forensics and security 11
The hardware destruction issue 17
REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20
Volume 2021, Issue 9
Contents
NEWS
Supply chain attack on Kaseya compromises hundreds of firms 1
EC to launch joint cyber unit 3
FEATURES
Cyber security: what are we talking about? 6
Read the digital fingerprints: log analysis for digital forensics and security 11
The hardware destruction issue 17
REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20
Volume 2021, Issue 8
Contents
NEWS
Supply chain attack on Kaseya compromises hundreds of firms 1
EC to launch joint cyber unit 3
FEATURES
Cyber security: what are we talking about? 6
Read the digital fingerprints: log analysis for digital forensics and security 11
The hardware destruction issue 17
REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20
Volume 2021, Issue 6
Contents
NEWS
Attack on meat-packing firm provokes White House response 1
Fraud money intercepted 3
FEATURES
Trustworthy digital infrastructure for identity systems: why should privacy matter to security engineers? 6
Learning from learning: detecting account takeovers by identifying forgetful users 11
Deconstructing the SolarWinds breach 17
REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20
Volume 2021, Issue 5
Contents
NEWS
Ransomware taskforce launched while attackers score successes against major targets 1
Emotet deleted 3
FEATURES
The practical difference between known and unknown threats 6
SIM boxing – why mobile regulators need to act now 9
How to prepare for the onslaught of phishing email attacks 12
Insider attacks: human-factors attacks and mitigation 14
Are we losing the fight against cybercrime? 18
REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20
Volume 2021, Issue 4
Contents
NEWS
UK Government lays out plans for cyber dominance 1
Acer hit by record ransom 3
FEATURES
What is DOM XSS and why should you care? 6
Governance: the key driver for data-driven innovation 10
Prioritising risk for better efficiency and collaboration 13
Moving from employee compliance to employee success in the cyber security domain 16
REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20
Volume 2021, Issue 3
Contents
NEWS
Hundreds of thousands of organisations at risk from Exchange bugs 1
Supply chain attack hits airlines 2
FEATURES
Can’t find that perfect gift? Blame the bots 6
Defending against insider threats with network security’s eighth layer 8
How a humanities background provides real value in cyber security 13
Maximising protection in an era of remote working 16
Cyberthreats are going mobile and it’s time to take action 18
REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20
Volume 2021, Issue 2
Contents
NEWS
Infamous Emotet botnet taken down by law enforcement 1
Fraud reaches epidemic levels 3
FEATURES
Achieving GDPR compliance post-Privacy Shield 6
Securing the remote workforce in the new normal 8
Why effective testing is essential to keep pace with advancing threats 12
The rise of MSP & CSP vulnerabilities: storehouses for secure data 15
REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20
Volume 2021, Issue 1
Contents
NEWS
Fraudsters rob banks of millions via emulated mobile devices 1
North Korea attacks Covid-19 research bodies 3
FEATURES
Keep the dark web close and your cyber security tighter 6
Simplifying security: how to navigate the integration challenge 8
Europe’s ambition for digital sovereignty must not undermine the Internet’s values 11
Cyber incident response and planning: a flexible approach 14
REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20
Volume 2020, Issue 12
Contents
NEWS
More attacks on Covid-19 vaccine suppliers and supply chain 1
Card cloning fuels fraud spree 3
FEATURES
Understanding the full cost of cyber security breaches 6
The pandemic, the acceleration of digital transformation and the impact on cyber security 13
Is the service desk the weakest link in IT security? 15
Credential stuffing: new tools and stolen data drive continued attacks 18
REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20