Volume 2020, Issue 11

Contents
NEWS
Major ransomware campaign targets healthcare facilities in US 1
BEC scams on the rise 3

FEATURES

Five steps to beating ransomware’s five-minute warning 6
Is this the end for ‘encro’ phones? 8
A system design for multi-phase, hybrid DDoS detection 10

REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2020, Issue 10

Contents
NEWS
Ransomware claims first fatality as healthcare under renewed assault 1
FBI makes 179 arrests in dark web sting 3

FEATURES
Moving from blocker to enabler: cloud security and the modern CISO 6
How to leverage data security in a post-Covid world 9
PKI is key to securing a post-Covid remote workforce 12
Security controls in infrastructure as code 13

REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2020, Issue 9

Contents
NEWS
North Korea steps up cyber attacks as US fights back 1
Massive new botnet discovered 3

FEATURES

The challenge of privacy and consent enforcement in large-scale enterprise application programmes 6
Securing your remote workforce against new phishing attacks 9
The top three factors driving zero trust adoption 13
Why is phishing still successful? 15

REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2020, Issue 8

Contents
NEWS
Garmin among hardest hit in major wave of ransomware attacks 1
Arrests made over Twitter breach 3

FEATURES

Home working and cyber security – an outbreak of unpreparedness? 6
A deep dive into Avivore 12
GDPR in the new remote-working normal 14
Facing ransomware: an approach with private cloud and sentinel software 16

Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2020, Issue 7

Contents
NEWS
Hundreds of alleged criminals arrested after European authorities infiltrate encrypted chat service 1
Decades’ worth of US police records leaked 3
Russians get into the BEC game 3

FEATURES
Using graph databases to detect financial fraud 6
Overcoming the security risks of remote working 10
The ‘dark data’ conundrum 13
Is credential stuffing the new phishing? 16

Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2020, Issue 6

Contents
NEWS
Ransomware operators now auctioning stolen data 1
EasyJet suffers massive breach 3

FEATURES
The rise of telemedicine: how to mitigate potential fraud 6
Removing a false sense of (open source) security 8
Cyber security and the remote workforce 11
A forensic study of Tor usage on the Raspberry Pi platform using open source tools 13

Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2020, Issue 5

Contents
NEWS
Cybercrime in a time of coronavirus 1
Study reveals real cost of cybercrime 3

FEATURES

Is there a silver bullet to stop cybercrime? 6
Stress-testing the skills gap 9
A multi-cloud world requires a multi-cloud security approach 11
DMASK-BAN: Improving the security of body area networks 13

REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2020, Issue 4

Contents
NEWS
Attacks on hospitals increase as criminals exploit pandemic 1
Marriott breached again 3
E-commerce fraud to top $25bn 3

FEATURES
The impact of acquisitions on security technology 6
How can man and machine collaborate? 9
Operating systems reaching end of life – don’t put yourself at risk 11
A wake-up call for data integrity invulnerability 14

REGULAR
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2020, Issue 3

Contents
NEWS
MGM, Virgin Media and T-Mobile among latest breach victims 1
FBI reckons ransomware costs 3

FEATURES

Making sense of human threats and errors 6
Signs your cyber security is doomed to fail 10
File system anti-forensics – types, techniques and tools 14

Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2020, Issue 2

Contents
NEWS
Wawa breach may have leaked millions of payment card details 1
UK plans IoT law 3

FEATURES

Addressing cyber security skills: the spectrum, not the silo 6
How cyber insurance can still leave you vulnerable to risks 12
The business benefits of cyber security for SMEs 14
The financial motivation to keep information secure 18

Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2020, Issue 1

Contents
NEWS
US-Iran conflict stokes fears of widespread cyberwar outbreak 1
Travelex knocked offline by malware 3

FEATURES
The people problem: how cyber security’s weakest link can become a formidable asset 6
Preventive medicine is the best method for computer hygiene 9
Navigating the cyber-insurance landscape to protect MSPs and their clients 12
A malicious activity monitoring mechanism to detect and prevent ransomware 14

Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2019, Issue 12

Contents
NEWS
Authorities eliminate RAT threat and take down fraud operations 1
Targeting health data 3

FEATURES
Why it’s time for MSPs to sharpen their security focus 6
Why enterprises need to adopt ‘need-to-know’ security 9
Dual-stage intrusion detection for class imbalance scenarios 12

REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2019, Issue 11

Contents
NEWS
UK fraud increases again as Action Fraud comes under fire 1
UK Government funds security developments 3

FEATURES
Password meters: inaccurate advice offered inconsistently? 6
The guide to ransomware: how businesses can manage the evolving threat 14
Gateway to securing the cloud 16

REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2019, Issue 10

Contents
NEWS
FBI issues ransomware warning as hospitals hit 1
Police raids take down cybercrime servers 19


FEATURES
How graph technology can map patterns to mitigate money-laundering risk 6
Could SOAR save skills-short SOCs? 8
A source code perspective framework to produce secure web applications 11

REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2019, Issue 9

Contents
NEWS
Anti-fraud unit takes down 13 organised crime gangs in UK 1
Texas and dentists hit with ransomware 3


FEATURES
Cyber security and the brand 6
Examining Turkish law on data protection 9
Just about managing: dealing with the threats to industrial systems 11
How can CISOs use AI in their business? 14
Close to home: building in-house security expertise 16

Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2019, Issue 8

Contents
NEWS
Power blackouts and government systems taken offline following multiple ransomware attacks 1
Criminals target financial services 3

FEATURES
AI vs AI: fraudsters turn defensive technology into an attack tool 6
Why employees matter in the fight against ransomware 8
Improving employees’ cyber security awareness 11
A readiness assessment tool for GDPR compliance certification 14

Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2019, Issue 7

Contents
NEWS
Florida cities pay up after crippling ransomware attacks 1
Sharp rise in attacks on financial firms 3

FEATURES

Back to basics: tackling security threats in an increasingly complex world 6
How to implement a robust BCDR plan 8
Fifteen years of phishing – can technology save us? 11
Making sense of the dark web 17

REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2019, Issue 6

Contents
NEWS
GozNym cybercrime gang busted by international law enforcement operation 1
Data breach at major healthcare firms 3

FEATURES
Nine dangerous myths about identity governance 6
Cybercrime has evolved: it’s time cyber security did too 8
A basic malware analysis method 11

REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2019, Issue 5

Contents
NEWS
Church scammed as FBI warns of major rise in BEC fraud 1
Dark markets busted 3

FEATURES

How readable are data breach notifications? 6
Gamification as a winning cyber security strategy 9
IoT security: could careless talk cost livelihoods? 12
How ethical hacking can protect organisations from a greater threat 15

Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2019, Issue 4

Contents
NEWS
Multiple ransomware attacks hit major
targets worldwide 1
UK security programme criticised 3

FEATURES

Disrupting dark web supply chains to protect precious data 6
The art of phishing: past, present and future 9
Avoiding the weaknesses of a penetration test 11
Confusing terminology stunts the growth of cyber insurance 16
How not to become a crypto-jacking statistic 18

Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2019, Issue 3

Contents
NEWS
New reports reveal scale of nation-state hacking 1

FEATURES

Headline hype disguises security failings 6
Best practices for preventing and recovering from a ransomware attack 8
From wooden shoe to click of a button: the risk of disgruntled employees 10
Protecting data in an age of cloud and virtualisation 14
Rating the risk: how to assess the dangers of working with other organisations 16

Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2019, Issue 2

Contents
NEWS
Google is first company hit with major GDPR fine 1
Cost of cybercrime jumps 24% 3

FEATURES

Understanding the credential theft lifecycle 6
Three ways in which GDPR impacts authentication 9
A framework to define the relationship between cyber security and cloud performance 12

REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2019, Issue 1

Contents
NEWS
China chief suspect in breach of EU communications while US & UK level new accusations of hacking 1
Mass dump of German politicians’ messages and documents 3

FEATURES
Zero-day recovery: the key to mitigating the ransomware threat 6
GDPR – project or permanent reality? 9
How deception can change cyber security defences 12
Securing the new wave of non-human users 15
Understanding the evolution of malware 17

REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2018, Issue 12

Contents
NEWS
Marriott hotel chain and Quora website suffer massive breaches 1
Major BEC gang targets top executives 3
Police struggle to investigate cyber cases 19

FEATURES

Focus on protecting what’s most important – the data 6
A framework for security technology cohesion in the era of the GDPR 8
Challenges and opportunities in cyber weapon norm construction 11

REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2018, Issue 11

Contents
NEWS
Marriott hotel chain and Quora website suffer massive breaches 1
Major BEC gang targets top executives 3
Police struggle to investigate cyber cases 19

FEATURES
Focus on protecting what’s most important – the data 6
A framework for security technology cohesion in the era of the GDPR 8
Challenges and opportunities in cyber weapon norm construction 11

REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20