


default search action
Network Security, Volume 2014
Volume 2014, Number 1, January 2014
- Steve Watts:

Protecting your identity when working remotely. 5-7 - Barry Shteiman:

Why CMS platforms are breeding security vulnerabilities. 7-9 - Mike Patterson:

An index for network threat detection. 9-11 - Steve Mansfield-Devine:

Interview: Corey Nachreiner, WatchGuard - security visibility. 11-15 - Richard Moulds:

The global data protection conundrum. 16-17 - Conrad Constantine:

Big data: an information security context. 18-19
Volume 2014, Number 2, February 2014
- Mark Kedgley:

File integrity monitoring in the modern threat landscape. 5-8 - Peter Heim:

The quest for clarity on data protection and security. 8-10 - Stephen Allen:

Medical device software under the microscope. 11-12 - Hongwen Zhang:

A vision for cloud security. 12-15 - Steve Gold:

In search of a new perimeter. 15-20
Volume 2014, Number 3, March 2014
- Tracey Caldwell:

Call the digital fire brigade. 5-8 - Pat Barnes:

Using DNS to protect networks from threats within. 9-11 - Daniëlle van Leeuwen:

Bring your own software. 12-13 - Danny Bradbury:

Can we make email secure? 13-16 - Florian Malecki:

The cost of network-based attacks. 17-18 - Mike Keightley:

The looming XP disaster in industrial environments. 18-20
Volume 2014, Number 4, April 2014
- Ross Brewer:

Advanced persistent threats: minimising the damage. 5-9 - Harry Sverdlove:

The Java vulnerability landscape. 9-14 - Danny Bradbury:

Unveiling the dark web. 14-17 - Keith Bird:

Sandboxing: a line in the sand against malware. 18-20
Volume 2014, Number 5, May 2014
- Martin Maisey:

Moving to analysis-led cyber-security. 5-12 - Mark Southam:

DNSSEC: What it is and why it matters. 12-15 - Jon Inns:

The evolution and application of SIEM systems. 16-17 - Sonia Blizzard:

Don't feed the hackers: how your attitude to data security could affect business. 18-20
Volume 2014, Number 6, June 2014
- C. J. Radford:

Challenges and solutions protecting data within Amazon Web Services. 5-8 - Danny Bradbury:

Testing the defences of bulletproof hosting companies. 8-12 - Steve Gold:

Challenges ahead on the digital forensics and audit trails. 12-17 - Chris Marrison:

DNS as an attack vector - and how businesses can keep it secure. 17-20
Volume 2014, Number 7, July 2014
- Jean-Yves Bisiaux:

DNS threats and mitigation strategies. 5-9 - Allen Storey:

There's nothing 'smart' about insecure connected devices. 9-12 - Patrick Bedwell:

Finding a new approach to SIEM to suit the SME environment. 12-16 - Steve Mansfield-Devine:

Building in security. 16-19
Volume 2014, Number 8, August 2014
- Phil Bridge:

EU puts pressure on businesses to erase data. 5-8 - Andrew Tang:

A guide to penetration testing. 8-11 - Mark Lowe:

Defending against cyber-criminals targeting business websites. 11-13 - Steve Mansfield-Devine:

Not coping with change. 14-17 - Steve Watts:

Intelligent combination - the benefits of tokenless two-factor authentication. 17-20
Volume 2014, Number 9, September 2014
- Simon Saunders:

Protecting against espionage. 5-7 - Phil Beckett:

BYOD - popular and problematic. 7-9 - Julie Lockner:

Do you know where your sensitive data is kept? 10-12 - Steve Mansfield-Devine:

Hacking on an industrial scale. 12-16 - Oded Gonda:

Understanding the threat to SCADA networks. 17-18 - Lasse Andresen:

Open sourcing the future of IAM. 18-20
Volume 2014, Number 10, October 2014
- Jody Brazil:

Security metrics to manage change. 5-7 - Alexandra Boldyreva, Paul Grubbs:

Making encryption work in the cloud. 8-10 - Danny Bradbury:

Anonymity and privacy: a guide for the perplexed. 10-14 - Paul Martini:

A secure approach to wearable technology. 15-17 - Steve Mansfield-Devine:

Masking sensitive data. 17-20
Volume 2014, Number 11, November 2014
- Ken Munro:

Android scraping: accessing personal data on mobile devices. 5-9 - Mark John Taylor, John Haggerty, David Gresty, Peter Almond, Tom Berry:

Forensic investigation of social networking applications. 9-16 - Steve Mansfield-Devine:

Mobile security: it's all about behaviour. 16-20
Volume 2014, Number 12, December 2014
- David Tipping:

The rising threats from Voice over IP. 5-6 - Gursev Singh Kalra:

Threat analysis of an enterprise messaging system. 7-13 - Robert Jones, Tony Dearsley:

Time for a data detox. 13-15 - Joe Goldberg:

Tackling unknown threats. 16-17 - Ashley Lane:

Cross domain solutions - and why they matter. 18-20

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














