Volume 2022, Issue 5
Contents
Encrypted DNS: The good, the bad and the moot
GEORGIOS KAMBOURAKIS
How SMEs can prevent third-party vendor data breaches
OLIVER PINSON-ROXBURGH
Sophos: The State of Ransomware 2022
STEVE MANSFIELD-DEVINE
Cloud – buzzword or business plan?
PATRICK WRAGG
Volume 2022, Issue 4
Contents
The who, what, why and when of data protection impact assessments
NIGEL JONES
RATs in the cloud: gaining access to container environments
ASSAF MORAG
Securing the API economy
TRAVIS SPENCER
The age of holistic consolidation and automation of cyber security
TIM WALLEN
Cyber Security Breaches Survey 2022
STEVE MANSFIELD-DEVINE
How government bodies can lead the field on data management and privacy
JON FIELDING
Volume 2022, Issue 3
Contents
Assessing cyber security consumer support from technology retailers
BIAR KOSHNAW
STEVEN FURNELL
Identifying the changing faces of international fraudsters
SAM RANIERI
How tech hiring is changing
GRAHAM HUNTER
Electronic-signatures – elegant solution or operational risk?
JASON PUGH
Is the GDPR a ticking time bomb for companies?
MUNDEEP NAYYAR
Volume 2022, Issue 2
Contents
TXOne Networks: 2021 Cyber security Report
Preparing for data reclaim requests from online shopping
GAL RINGEL
Building successful software security initiatives
JACOB EWERS
Managing a remote workforce's IT
SCOTT DAVIDSON
The emergence of data governance as a service
MICHAEL QUEENAN
Why we need more women in cyber security
ANDREA BABBS
The modern CISO: where marketing meets security
ALICE SHORT
ROLAND CARANDANG
Volume 2022, Issue 1
Contents
Security should shift left too
BERNARD MONTEL
Better security through diversity – a personal perspective
LEILA IRANMANESH
Identity verification in a post-pandemic world
ROBERT PRIGGE
Life after Emotet – the lessons learned
GEORGE GLASS
Embracing security transformation with MDR
MARTIN RILEY
Securing the blockchain for fintech companies
MARIO GALATOVIC
Volume 2021, Issue 12
Contents
NEWS
Supply chain attack on Kaseya compromises hundreds of firms 1
EC to launch joint cyber unit 3
FEATURES
Cyber security: what are we talking about? 6
Read the digital fingerprints: log analysis for digital forensics and security 11
The hardware destruction issue 17
REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20
Volume 2021, Issue 11
Contents
NEWS
Supply chain attack on Kaseya compromises hundreds of firms 1
EC to launch joint cyber unit 3
FEATURES
Cyber security: what are we talking about? 6
Read the digital fingerprints: log analysis for digital forensics and security 11
The hardware destruction issue 17
REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20
Volume 2021, Issue 10
Contents
NEWS
Supply chain attack on Kaseya compromises hundreds of firms 1
EC to launch joint cyber unit 3
FEATURES
Cyber security: what are we talking about? 6
Read the digital fingerprints: log analysis for digital forensics and security 11
The hardware destruction issue 17
REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20
Volume 2021, Issue 9
Contents
NEWS
Supply chain attack on Kaseya compromises hundreds of firms 1
EC to launch joint cyber unit 3
FEATURES
Cyber security: what are we talking about? 6
Read the digital fingerprints: log analysis for digital forensics and security 11
The hardware destruction issue 17
REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20
Volume 2021, Issue 8
Contents
NEWS
Supply chain attack on Kaseya compromises hundreds of firms 1
EC to launch joint cyber unit 3
FEATURES
Cyber security: what are we talking about? 6
Read the digital fingerprints: log analysis for digital forensics and security 11
The hardware destruction issue 17
REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20
Volume 2021, Issue 6
Contents
NEWS
Attack on meat-packing firm provokes White House response 1
Fraud money intercepted 3
FEATURES
Trustworthy digital infrastructure for identity systems: why should privacy matter to security engineers? 6
Learning from learning: detecting account takeovers by identifying forgetful users 11
Deconstructing the SolarWinds breach 17
REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20
Volume 2021, Issue 5
Contents
NEWS
Ransomware taskforce launched while attackers score successes against major targets 1
Emotet deleted 3
FEATURES
The practical difference between known and unknown threats 6
SIM boxing – why mobile regulators need to act now 9
How to prepare for the onslaught of phishing email attacks 12
Insider attacks: human-factors attacks and mitigation 14
Are we losing the fight against cybercrime? 18
REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20
Volume 2021, Issue 4
Contents
NEWS
UK Government lays out plans for cyber dominance 1
Acer hit by record ransom 3
FEATURES
What is DOM XSS and why should you care? 6
Governance: the key driver for data-driven innovation 10
Prioritising risk for better efficiency and collaboration 13
Moving from employee compliance to employee success in the cyber security domain 16
REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20
Volume 2021, Issue 3
Contents
NEWS
Hundreds of thousands of organisations at risk from Exchange bugs 1
Supply chain attack hits airlines 2
FEATURES
Can’t find that perfect gift? Blame the bots 6
Defending against insider threats with network security’s eighth layer 8
How a humanities background provides real value in cyber security 13
Maximising protection in an era of remote working 16
Cyberthreats are going mobile and it’s time to take action 18
REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20
Volume 2021, Issue 2
Contents
NEWS
Infamous Emotet botnet taken down by law enforcement 1
Fraud reaches epidemic levels 3
FEATURES
Achieving GDPR compliance post-Privacy Shield 6
Securing the remote workforce in the new normal 8
Why effective testing is essential to keep pace with advancing threats 12
The rise of MSP & CSP vulnerabilities: storehouses for secure data 15
REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20
Volume 2021, Issue 1
Contents
NEWS
Fraudsters rob banks of millions via emulated mobile devices 1
North Korea attacks Covid-19 research bodies 3
FEATURES
Keep the dark web close and your cyber security tighter 6
Simplifying security: how to navigate the integration challenge 8
Europe’s ambition for digital sovereignty must not undermine the Internet’s values 11
Cyber incident response and planning: a flexible approach 14
REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20
Volume 2020, Issue 12
Contents
NEWS
More attacks on Covid-19 vaccine suppliers and supply chain 1
Card cloning fuels fraud spree 3
FEATURES
Understanding the full cost of cyber security breaches 6
The pandemic, the acceleration of digital transformation and the impact on cyber security 13
Is the service desk the weakest link in IT security? 15
Credential stuffing: new tools and stolen data drive continued attacks 18
REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20
Volume 2020, Issue 11
Contents
NEWS
Major ransomware campaign targets healthcare facilities in US 1
BEC scams on the rise 3
FEATURES
Five steps to beating ransomware’s five-minute warning 6
Is this the end for ‘encro’ phones? 8
A system design for multi-phase, hybrid DDoS detection 10
REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20
Volume 2020, Issue 10
Contents
NEWS
Ransomware claims first fatality as healthcare under renewed assault 1
FBI makes 179 arrests in dark web sting 3
FEATURES
Moving from blocker to enabler: cloud security and the modern CISO 6
How to leverage data security in a post-Covid world 9
PKI is key to securing a post-Covid remote workforce 12
Security controls in infrastructure as code 13
REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20
Volume 2020, Issue 9
Contents
NEWS
North Korea steps up cyber attacks as US fights back 1
Massive new botnet discovered 3
FEATURES
The challenge of privacy and consent enforcement in large-scale enterprise application programmes 6
Securing your remote workforce against new phishing attacks 9
The top three factors driving zero trust adoption 13
Why is phishing still successful? 15
REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20
Volume 2020, Issue 8
Contents
NEWS
Garmin among hardest hit in major wave of ransomware attacks 1
Arrests made over Twitter breach 3
FEATURES
Home working and cyber security – an outbreak of unpreparedness? 6
A deep dive into Avivore 12
GDPR in the new remote-working normal 14
Facing ransomware: an approach with private cloud and sentinel software 16
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20
Volume 2020, Issue 7
Contents
NEWS
Hundreds of alleged criminals arrested after European authorities infiltrate encrypted chat service 1
Decades’ worth of US police records leaked 3
Russians get into the BEC game 3
FEATURES
Using graph databases to detect financial fraud 6
Overcoming the security risks of remote working 10
The ‘dark data’ conundrum 13
Is credential stuffing the new phishing? 16
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20
Volume 2020, Issue 6
Contents
NEWS
Ransomware operators now auctioning stolen data 1
EasyJet suffers massive breach 3
FEATURES
The rise of telemedicine: how to mitigate potential fraud 6
Removing a false sense of (open source) security 8
Cyber security and the remote workforce 11
A forensic study of Tor usage on the Raspberry Pi platform using open source tools 13
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20
Volume 2020, Issue 5
Contents
NEWS
Cybercrime in a time of coronavirus 1
Study reveals real cost of cybercrime 3
FEATURES
Is there a silver bullet to stop cybercrime? 6
Stress-testing the skills gap 9
A multi-cloud world requires a multi-cloud security approach 11
DMASK-BAN: Improving the security of body area networks 13
REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20
Volume 2020, Issue 4
Contents
NEWS
Attacks on hospitals increase as criminals exploit pandemic 1
Marriott breached again 3
E-commerce fraud to top $25bn 3
FEATURES
The impact of acquisitions on security technology 6
How can man and machine collaborate? 9
Operating systems reaching end of life – don’t put yourself at risk 11
A wake-up call for data integrity invulnerability 14
REGULAR
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20