


default search action
Network Security, Volume 2021
Volume 2021, Number 1, January 2021
- Andy Gent:
How can mobile networks protect critical infrastructure? 6-8 - Dave Klein:
Relying on firewalls? Here's why you'll be hacked. 9-12 - Sudhir Udipi:
The event data management problem: getting the most from network detection and response. 12-14 - Connor Morley:
Shining a light on UEFI - the hidden memory space being exploited in attacks. 14-17 - Florian Malecki:
Now is the time to move past traditional 3-2-1 back-ups. 18-19 - Phil Jones:
Power and security in a common mission. 20
Volume 2021, Number 2, February 2021
- Steve Mansfield-Devine:
Who's that knocking at the door? The problem of credential abuse. 6-15 - Ollie Sheridan:
The state of zero trust in the age of fluid working. 15-17 - Brendan Walsh:
Avoiding costly downtime - how MSPs can manage their networks. 17-19 - Colin Tankard:
Credential stuffing - the new hack. 20
Volume 2021, Number 3, March 2021
- Chad Anderson, John 'Turbo' Conwell, Tarik Saleh:
Investigating cyber attacks using domain and DNS data. 6-8 - Rashid Ali:
Looking to the future of the cyber security landscape. 8-10 - Steve Mansfield-Devine:
Locking the door: tackling credential abuse. 11-19 - Karen Renaud
:
Learning from the past. 20
Volume 2021, Number 4, April 2021
- Tom McVey:
Trickbot re-emerges with fresh deception techniques. 6 - Sivaraman Eswaran, Aruna Srinivasan
, Prasad B. Honnavalli
:
A threshold-based, real-time analysis in early detection of endpoint anomalies using SIEM expertise. 7-16 - David Emm:
Gamification - can it be applied to security awareness training? 16-18 - Matias Katz:
Securing connectivity for remote workforces. 18-19 - David Fox:
Agile security testing. 20
Volume 2021, Number 5, May 2021
- Tom McVey:
Browser exploits: ensuring safety when surfing. 6 - Reinhardt A. Botha
, Steven Furnell:
Facing up to security and privacy in online meetings. 7-13 - Sergio Loureiro:
Security misconfigurations and how to prevent them. 13-16 - Scott Dodds:
When is the right time to outsource your security function? 16-19 - Fernando Guerrero Bautista:
The complexity of healthcare cyber security. 20
Volume 2021, Number 6, June 2021
- Tom McVey:
Analysing three new complex phishing tactics. 6 - David Greenwood:
Applying the principles of zero-trust architecture to protect sensitive and critical data. 7-9 - Dale Geach:
Grid cyber security: secure by design, continuous threat monitoring, effective incident response and board oversight. 9-12 - Zaid J. Al-Araji, Sharifah Sakinah Syad Ahmed, Raihana Syahirah Abdullah, Ammar Awad Mutlag, Hayder Adil Abdul Raheem, Siti Rohanah Hasan Basri:
Attack graph reachability: concept, analysis, challenges and issues. 13-19 - Colin Tankard:
Quantifying cyber risk. 20
Volume 2021, Number 7, July 2021
- Tom McVey:
Smishing uses short-lived URLs to avoid detection. 6 - Barry Hensley:
Identity is the new perimeter in the fight against supply chain attacks. 7-9 - Marc Lueck:
The seven myths of encrypted traffic scanning. 9-12 - Guido Grillenmeier:
Now's the time to rethink Active Directory security. 13-16 - Stephen Young:
When ransomware strikes, what's your recovery plan? 16-19 - Karen Renaud
:
Cyber security is a team effort. 20
Volume 2021, Number 8, August 2021
- Tom McVey:
Tackling the ransomware pandemic. 6 - Ron Davidson:
The fight against malware as a service. 7-11 - Kingsley Hayes:
Ransomware: a growing geopolitical threat. 11-13 - Simon Pamplin:
SD-WAN revolutionises IoT and edge security. 14-15 - Cathy Pitt:
Improving security in the manufacturing industry. 16-18 - Altaz Valani:
A multi-pronged approach to effective application security. 18-19 - Daniel Gibson:
IoT law and order. 20
Volume 2021, Number 9, September 2021
- Tom McVey:
HTML smuggling: analysing the ISOMorph attack. 6 - Rodney Joffe:
Network security in the new world of work. 7-9 - Martin Giess:
CPaaS and SASE: the best defences against IoT threats. 9-12 - Tamas Kadar:
Turning breaches from losses to wins. 13-15 - Avesta Hojjati:
The case for certificate automation. 15-17 - Rob Allen:
Reducing the security risks of USB devices. 17-19 - Fernando Guerrero Bautista:
Upgrading data privacy and protection. 20
Volume 2021, Number 10, October 2021
- Tom McVey, Menlo Security:
Warning: it's attack season. 6 - Alex Kirk:
A network with nowhere to hide. 7-9 - Martin Thompson:
CISOs should work closely with their ITAM colleagues. 9-12 - Max Locatelli:
How financial services firms can mitigate the next wave of attacks. 12-14 - Jason Sabin:
The future of security in a remote-work environment. 15-17 - Amy Hodler:
Shining a light on organisational risk. 18-19 - Colin Tankard:
Wifi 6 - has it delivered? 20
Volume 2021, Number 11, November 2021
- Tom McVey:
Evaluating your security for remote working. 6 - Kevin Curran
:
After the pandemic: securing smart cities. 7-9 - Richard Hughes:
Smart plugs invite cyber criminals into the home. 9-12 - Alex Cowan:
Coming off the tracks: the cyberthreats facing rail operators. 12-14 - Guido Grillenmeier:
Protecting Active Directory against modern threats. 15-17 - Duncan Godfrey:
Layering identity and access management to disrupt attacks. 17-19 - Karen Renaud:
The A-Z of cyber security. 20
Volume 2021, Number 12, December 2021
- Tom McVey:
Analysing the spike in SEO poisoning. 6 - Kurt Glazemakers:
Opening the network to DevOps without letting threats inside. 7-9 - Gareth Jehu:
Adopting a robust domain name security strategy. 10-12 - Assaf Morag, Itamar Maouda:
Understanding the evolving threat landscape - APT techniques in a container environment. 13-17 - Thomas MacKenzie:
The hefty price you pay for manual triage. 18-19 - Gio Cozzolino:
SOC vs MSSP vs hybrid. 20

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
