


default search action
Network Security, Volume 2019
Volume 2019, Number 1, January 2019
- Gabe Perez:
A practical approach to securing IoT. 6-8 - Andrea Oliveri
, Filippo Lauria:
Sagishi: an undercover software agent for infiltrating IoT botnets. 9-14 - Gary Cox:
Managing the risks of shadow IoT. 14-17 - Roderick Hodgson:
Solving the security challenges of IoT with public key cryptography. 17-19 - Ian Goslin:
Know your enemy. 20
Volume 2019, Number 2, February 2019
- Robert Rutherford:
Internet of Things - striking the balance between competition and security. 6-8 - Sean Keef:
Using analytics-driven automation to target the biggest vulnerabilities. 8-11 - Adam Vincent:
Don't feed the phish: how to avoid phishing attacks. 11-14 - Phil Bindley:
Joining the dots: how to approach compliance and data governance. 14-16 - Simon Yeoman:
How secure are bare metal servers? 16-17 - Sean Newman:
Under the radar: the danger of stealthy DDoS attacks. 18-19 - Ganna Pogrebna
, Karen Renaud
, Boris Taratine:
The many faces of active cyber. 20
Volume 2019, Number 3, March 2019
- Dave Klein:
Micro-segmentation: securing complex cloud environments. 6-10 - Jesse Canada:
Is reputational damage worse than a regulator's fine? 11-12 - Greig Schofield:
Has your wifi left you wide open to cybercrime? 13-14 - Sam Haria:
The growth of the hide and seek botnet. 14-17 - Rory Duncan:
How to secure your supply chain. 18-19 - Colin Tankard:
IoT regulations: fact or fiction? 20
Volume 2019, Number 4, April 2019
- Daniel Goldberg:
Living with decade-old vulnerabilities in datacentre software. 6-8 - Nick Jewell:
The analytics lifecycle and the age of innovation. 8-11 - Sascha Giese:
The endpoint epidemic of IoT - just a bad dream? 11-12 - Sean Herbert:
Preventing software from opening doors to the network. 13-15 - Alex Mathews:
What can machine learning do for information security? 15-17 - Nick Boughton:
Protecting infrastructure from cyber attack. 18-19 - Dave Spence:
The non-functional requirement fallacy. 20
Volume 2019, Number 5, May 2019
- Omar Yaacoubi:
The rise of encrypted malware. 6-9 - Scott Gordon:
A matter of trust. 9-11 - Van Linh Nguyen
, Po-Ching Lin, Ren-Hung Hwang
:
Web attacks: defeating monetisation attempts. 11-19 - Ian Goslin:
Cyber extortion is threatening Industry 4.0. 20
Volume 2019, Number 6, June 2019
- SophosLabs Research Team:
Emotet exposed: looking inside highly destructive malware. 6-11 - Nick Boughton:
Protecting the world of connected devices. 11-13 - Jason Macy:
Product vs toolkit: API and IAM security. 13-15 - Akashdeep Bhardwaj
, Sam Goundar
:
A framework for effective threat hunting. 15-19 - Karen Renaud
, Verena Zimmermann:
Encouraging password manager use. 20
Volume 2019, Number 7, July 2019
- Michael Roytman, Jay Jacobs:
The complexity of prioritising patching. 6-9 - Sean Herbert:
Why IIoT should make businesses rethink security. 9-11 - Paul Breitbarth:
The impact of GDPR one year on. 11-13 - Peter Barker:
Visual hacking - why it matters and how to prevent it. 14-17 - Jan Oetjen:
Using artificial intelligence in the fight against spam. 17-19 - Colin Tankard:
Why you need Cyber Essentials. 20
Volume 2019, Number 8, August 2019
- Keenan Skelly:
It's a war out there: why malicious hackers are beating businesses to the punch - and what we can do about it. 6-8 - Dawood Ghalaieny:
Achieving IoT nirvana by protecting cellular networks. 8-12 - Mike O'Malley:
Securing the future of AgTech. 12-14 - Thorsten Kurpjuhn:
Demystifying the role of AI for better network security. 14-17 - Adrian Taylor:
Decrypting SSL traffic: best practices for security, compliance and productivity. 17-19 - Dave Spence:
Response in the cloud. 20
Volume 2019, Number 9, September 2019
- Spencer Young:
Automated systems only: why CISOs should switch off their dumb machines. 6-8 - Roger Grimes:
The many ways to hack 2FA. 8-13 - Andy Baldin:
Best practices for fighting the fileless threat. 13-15 - Paul Walker:
Why do PAM projects fail? 15-18 - Charlene Bunting:
Cloud security: how to protect critical data and stay productive. 18-19 - Richard Goodall:
The ideal industrial SOC. 20
Volume 2019, Number 10, October 2019
- Ian Heritage:
Protecting Industry 4.0: challenges and solutions as IT, OT and IP converge. 6-9 - Steve Mansfield-Devine:
The state of operational technology security. 9-13 - Akashdeep Bhardwaj
, Vinay Avasthi, Sam Goundar
:
Cyber security attacks on robotic platforms. 13-19 - Colin Tankard:
Goodbye SIEM, hello SOARX. 20
Volume 2019, Number 11, November 2019
- Chris Knauer:
How contact centres can leave businesses exposed to cybercrime. 6-9 - Tom Stitt:
Office walls and roadblocks: how workflows and terminology get in the way of visibility. 9-13 - Stu Homan:
The importance of domains to security management. 13-15 - Azeem Aleem:
Treading water: why organisations are making no progress on cyber security. 15-18 - Nathalie Künneke-Trenaman:
RPKI and the future of routing security. 18-19 - Karen Renaud
, Marc J. Dupuis:
Should we scare people into behaving securely? 20
Volume 2019, Number 12, December 2019
- Tim Callan, Chris Bailey:
Changes to extended validation indicators put users at risk. 6-8 - Steve Thompson:
Apprenticeships as the answer to closing the cyber skills gap. 9-11 - Mouhammd Alkasassbeh
, Tariq Khairallah:
Winning tactics with DNS tunnelling. 12-19 - Dave Spence:
Resilience in the supply chain. 20

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.