Contents
Curbing modern cyberthreats
SAMIR DESAI

Understanding the complexities of operational technology security
ERIC ESCOBAR

A forensic method for investigating manipulated video recordings
ILKER KARA
CEREN KORKMAZ
ALIHAN KARATATAR
MURAT AYDOS

The perfect cyber storm – security budgets, skills shortages and automated attacks
PHIL ROBINSON

Published: 2024-09-19