Volume 2018, Issue 10

Contents
NEWS
Russia accused of hacking as its intelligence agents are expelled 1
Massive breach at Facebook 3

FEATURES

Using cyber insurance to run virtuous circles around cyber risk 6
The best form of defence – the benefits of red teaming 8
Fraud detection-oriented operators in a data warehouse based on forensic accounting techniques 13

REGULARS
Editorial 2
Report analysis 4
News in brief 5
The Sandbox 20
Calendar 20

Volume 2018, Issue 9

Contents
NEWS
Health sector leads sharp rise in data breach reports 1
Attackers are targeting people 3

FEATURES
Learning the lessons of WannaCry 6
GDPR is here and it is time to get serious 9
Crypto-jacking: how cyber-criminals are exploiting the crypto-currency boom 12
Scamming the scammers with their own tricks 14
Data in the post-GDPR world 17
How can adblocking play a significant role in an SME’s defence strategy? 18

Editorial 2
Report analysis 4
News in brief 5
Calendar 20

Volume 2018, Issue 8

Contents
NEWS
Technology drives down card fraud in major European countries 1
Cosco hit by ransomware 3
New alliance 3

FEATURES
The intelligent solution: automation, the skills shortage and cyber-security 6
Are miserly budgets putting businesses at risk of cyber-attack? 9
Get the full e-signature picture to avoid falling foul of the law 12
Not your fairy-tale prince: the Nigerian business email compromise threat 14
Nation-state hacking – a threat to everyone 17

Editorial 2
Report analysis 4
News in brief 5
Calendar 20

Volume 2018, Issue 7

Contents
NEWS
Financial organisations must show they’re ready for disaster 1
Big names in major breaches 3

FEATURES
Assessing website password practices – over a decade of progress? 6
The role of crypto-currency in cybercrime 13
Critical infrastructure: understanding the threat 16

Editorial 2
Report analysis 4
News in brief 5
Calendar 20

Volume 2018, Issue 6

Contents
NEWS
Massive malware infection targeted at Ukraine spreads worldwide 1
Cost of fraud increases 3

FEATURES
Two-factor inauthentication – the rise in SMS phishing attacks 6
PSD2: Is the banking industry prepared? 9
Can consumers bank on financial services being secure with GDPR? 11
GDPR – compliance nightmare or business opportunity? 14
Extreme prejudice: securing networks by treating all data as a threat 16

Editorial 2
Report analysis 4
News in brief 5
Calendar 20

Volume 2018, Issue 5

Contents
NEWS
Ransomware declining but email scams on the rise, says FBI 1
DDoS-for-hire operation taken down 3
Number of cybercrime victims falls 3

FEATURES
The future of Internet governance and cyber-security 5
The miners strike – addressing the crypto-currency threat to enterprise networks 8
Safe talk: setting the standard for secure communications 15

Editorial 2
Report analysis 4
News in brief 5
Calendar 20

Volume 2018, Issue 4

Contents
NEWS
Multiple breaches leak millions of customer records 1
Grindr criticised for sharing data 3

FEATURES

GDPR puts vendor contracts in the security spotlight 5
Secret digital coin mining and trading is a threat to your business 8
Making information security easier 10
VPN: from an obscure network to a widespread solution 14
Identity crisis: the disconnect between business and IT executives 16

Editorial 2
News in brief 4
Calendar 20

Volume 2018, Issue 3

Contents
NEWS
Charities and councils at high risk of cyber-attack 1
SEC issues new breach guidelines 3

FEATURES
Compliance is not security 5
A password to the future 8
Why the security industry should stop relying on FUD 10
A novel key expansion technique using diffusion 12

REGULARS
Editorial 2
News in brief 4
Calendar 20

Volume 2018, Issue 2

Contents
NEWS
NCSC claims successes against cyber-attacks but warns of major assault on industry in future 1
Attacks up but cybercrime down … or is it? 3

FEATURES
Designing flexible sandboxing solutions to adapt to new malware trends 5
Resistance, response and recovery 10
The threat on the end of the phone: the danger of contact centre agents 13
The malware arms race 15

REGULARS
Editorial 2
News in brief 4
Calendar 20

Volume 2018, Issue 1

Contents
NEWS
Spectre and Meltdown processor flaws threaten billions of computers and mobile devices 1

FEATURES
Plugging the skills gap: the vital role that women should play in cyber-security 5
Cloud first – tackling the security challenges 8
Using the service desk to secure the organisation 11
Phishing – challenges and solutions 15

REGULARS
Editorial 2
News in brief 4
Calendar 20