Volume 2022, Issue 5

Contents
Encrypted DNS: The good, the bad and the moot
GEORGIOS KAMBOURAKIS


How SMEs can prevent third-party vendor data breaches
OLIVER PINSON-ROXBURGH


Sophos: The State of Ransomware 2022
STEVE MANSFIELD-DEVINE


Cloud – buzzword or business plan?
PATRICK WRAGG

Volume 2022, Issue 4

Contents
The who, what, why and when of data protection impact assessments
NIGEL JONES


RATs in the cloud: gaining access to container environments
ASSAF MORAG


Securing the API economy
TRAVIS SPENCER


The age of holistic consolidation and automation of cyber security
TIM WALLEN


Cyber Security Breaches Survey 2022
STEVE MANSFIELD-DEVINE


How government bodies can lead the field on data management and privacy
JON FIELDING

Volume 2022, Issue 3

Contents
Assessing cyber security consumer support from technology retailers
BIAR KOSHNAW
STEVEN FURNELL


Identifying the changing faces of international fraudsters
SAM RANIERI


How tech hiring is changing
GRAHAM HUNTER


Electronic-signatures – elegant solution or operational risk?
JASON PUGH


Is the GDPR a ticking time bomb for companies?
MUNDEEP NAYYAR

Volume 2022, Issue 2

Contents
TXOne Networks: 2021 Cyber security Report


Preparing for data reclaim requests from online shopping
GAL RINGEL


Building successful software security initiatives
JACOB EWERS


Managing a remote workforce's IT
SCOTT DAVIDSON


The emergence of data governance as a service
MICHAEL QUEENAN


Why we need more women in cyber security
ANDREA BABBS


The modern CISO: where marketing meets security
ALICE SHORT
ROLAND CARANDANG


 

Volume 2022, Issue 1

Contents
Security should shift left too
BERNARD MONTEL


Better security through diversity – a personal perspective
LEILA IRANMANESH


Identity verification in a post-pandemic world
ROBERT PRIGGE


Life after Emotet – the lessons learned
GEORGE GLASS


Embracing security transformation with MDR
MARTIN RILEY


Securing the blockchain for fintech companies
MARIO GALATOVIC


 

Volume 2021, Issue 12

Contents
NEWS
Supply chain attack on Kaseya compromises hundreds of firms 1
EC to launch joint cyber unit 3

FEATURES

Cyber security: what are we talking about? 6
Read the digital fingerprints: log analysis for digital forensics and security 11
The hardware destruction issue 17

REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2021, Issue 11

Contents
NEWS
Supply chain attack on Kaseya compromises hundreds of firms 1
EC to launch joint cyber unit 3

FEATURES

Cyber security: what are we talking about? 6
Read the digital fingerprints: log analysis for digital forensics and security 11
The hardware destruction issue 17

REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2021, Issue 10

Contents
NEWS
Supply chain attack on Kaseya compromises hundreds of firms 1
EC to launch joint cyber unit 3

FEATURES
Cyber security: what are we talking about? 6
Read the digital fingerprints: log analysis for digital forensics and security 11
The hardware destruction issue 17

REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2021, Issue 9

Contents
NEWS
Supply chain attack on Kaseya compromises hundreds of firms 1
EC to launch joint cyber unit 3

FEATURES
Cyber security: what are we talking about? 6
Read the digital fingerprints: log analysis for digital forensics and security 11
The hardware destruction issue 17

REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2021, Issue 8

Contents
NEWS
Supply chain attack on Kaseya compromises hundreds of firms 1
EC to launch joint cyber unit 3

FEATURES
Cyber security: what are we talking about? 6
Read the digital fingerprints: log analysis for digital forensics and security 11
The hardware destruction issue 17

REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2021, Issue 6

Contents
NEWS
Attack on meat-packing firm provokes White House response 1
Fraud money intercepted 3

FEATURES
Trustworthy digital infrastructure for identity systems: why should privacy matter to security engineers? 6
Learning from learning: detecting account takeovers by identifying forgetful users 11
Deconstructing the SolarWinds breach 17

REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2021, Issue 5

Contents
NEWS
Ransomware taskforce launched while attackers score successes against major targets 1
Emotet deleted 3

FEATURES
The practical difference between known and unknown threats 6
SIM boxing – why mobile regulators need to act now 9
How to prepare for the onslaught of phishing email attacks 12
Insider attacks: human-factors attacks and mitigation 14
Are we losing the fight against cybercrime? 18

REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2021, Issue 4

Contents
NEWS
UK Government lays out plans for cyber dominance 1
Acer hit by record ransom 3

FEATURES

What is DOM XSS and why should you care? 6
Governance: the key driver for data-driven innovation 10
Prioritising risk for better efficiency and collaboration 13
Moving from employee compliance to employee success in the cyber security domain 16

REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2021, Issue 3

Contents
NEWS
Hundreds of thousands of organisations at risk from Exchange bugs 1
Supply chain attack hits airlines 2

FEATURES
Can’t find that perfect gift? Blame the bots 6
Defending against insider threats with network security’s eighth layer 8
How a humanities background provides real value in cyber security 13
Maximising protection in an era of remote working 16
Cyberthreats are going mobile and it’s time to take action 18

REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2021, Issue 2

Contents
NEWS
Infamous Emotet botnet taken down by law enforcement 1
Fraud reaches epidemic levels 3

FEATURES
Achieving GDPR compliance post-Privacy Shield 6
Securing the remote workforce in the new normal 8
Why effective testing is essential to keep pace with advancing threats 12
The rise of MSP & CSP vulnerabilities: storehouses for secure data 15

REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2021, Issue 1

Contents
NEWS
Fraudsters rob banks of millions via emulated mobile devices 1
North Korea attacks Covid-19 research bodies 3

FEATURES

Keep the dark web close and your cyber security tighter 6
Simplifying security: how to navigate the integration challenge 8
Europe’s ambition for digital sovereignty must not undermine the Internet’s values 11
Cyber incident response and planning: a flexible approach 14

REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2020, Issue 12

Contents
NEWS
More attacks on Covid-19 vaccine suppliers and supply chain 1
Card cloning fuels fraud spree 3

FEATURES

Understanding the full cost of cyber security breaches 6
The pandemic, the acceleration of digital transformation and the impact on cyber security 13
Is the service desk the weakest link in IT security? 15
Credential stuffing: new tools and stolen data drive continued attacks 18

REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2020, Issue 11

Contents
NEWS
Major ransomware campaign targets healthcare facilities in US 1
BEC scams on the rise 3

FEATURES

Five steps to beating ransomware’s five-minute warning 6
Is this the end for ‘encro’ phones? 8
A system design for multi-phase, hybrid DDoS detection 10

REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2020, Issue 10

Contents
NEWS
Ransomware claims first fatality as healthcare under renewed assault 1
FBI makes 179 arrests in dark web sting 3

FEATURES
Moving from blocker to enabler: cloud security and the modern CISO 6
How to leverage data security in a post-Covid world 9
PKI is key to securing a post-Covid remote workforce 12
Security controls in infrastructure as code 13

REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2020, Issue 9

Contents
NEWS
North Korea steps up cyber attacks as US fights back 1
Massive new botnet discovered 3

FEATURES

The challenge of privacy and consent enforcement in large-scale enterprise application programmes 6
Securing your remote workforce against new phishing attacks 9
The top three factors driving zero trust adoption 13
Why is phishing still successful? 15

REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2020, Issue 8

Contents
NEWS
Garmin among hardest hit in major wave of ransomware attacks 1
Arrests made over Twitter breach 3

FEATURES

Home working and cyber security – an outbreak of unpreparedness? 6
A deep dive into Avivore 12
GDPR in the new remote-working normal 14
Facing ransomware: an approach with private cloud and sentinel software 16

Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2020, Issue 7

Contents
NEWS
Hundreds of alleged criminals arrested after European authorities infiltrate encrypted chat service 1
Decades’ worth of US police records leaked 3
Russians get into the BEC game 3

FEATURES
Using graph databases to detect financial fraud 6
Overcoming the security risks of remote working 10
The ‘dark data’ conundrum 13
Is credential stuffing the new phishing? 16

Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2020, Issue 6

Contents
NEWS
Ransomware operators now auctioning stolen data 1
EasyJet suffers massive breach 3

FEATURES
The rise of telemedicine: how to mitigate potential fraud 6
Removing a false sense of (open source) security 8
Cyber security and the remote workforce 11
A forensic study of Tor usage on the Raspberry Pi platform using open source tools 13

Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2020, Issue 5

Contents
NEWS
Cybercrime in a time of coronavirus 1
Study reveals real cost of cybercrime 3

FEATURES

Is there a silver bullet to stop cybercrime? 6
Stress-testing the skills gap 9
A multi-cloud world requires a multi-cloud security approach 11
DMASK-BAN: Improving the security of body area networks 13

REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2020, Issue 4

Contents
NEWS
Attacks on hospitals increase as criminals exploit pandemic 1
Marriott breached again 3
E-commerce fraud to top $25bn 3

FEATURES
The impact of acquisitions on security technology 6
How can man and machine collaborate? 9
Operating systems reaching end of life – don’t put yourself at risk 11
A wake-up call for data integrity invulnerability 14

REGULAR
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20