Contents
Curbing modern cyberthreats
SAMIR DESAI
Understanding the complexities of operational technology security
ERIC ESCOBAR
A forensic method for investigating manipulated video recordings
ILKER KARA
CEREN KORKMAZ
ALIHAN KARATATAR
MURAT AYDOS
The perfect cyber storm – security budgets, skills shortages and automated attacks
PHIL ROBINSON
Published: 2024-09-19