Volume 2023, Issue 12

Contents
AI – bedazzled by its allure, blinded to its risks
AKBER DATOO, JAKE POPE


Can vulnerability disclosure be timely, detailed and coordinated?
MICHAEL ISBITSKI


Domain phishing: staying a step ahead of the threats
BRIAN LONERGAN


Safeguarding legacy equipment
JEREMY WHITTINGHAM


How to strengthen the software supply chain
BRIAN TRZUPEK


 

Volume 2023, Issue 11

Contents
Improving risk management – combining security and cyber insurance practices
PAUL BAIRD


How to assess the impact of generative artificial intelligence
GRAHAM HOSKING


Encryption blind spots: shining a light on cloud network traffic
MARK JOW


The NIS 2 Directive: securing critical assets
STEVE KENNY


 

Volume 2023, Issue 10

Contents
Embracing an outcome-based approach to cyber security
PAUL BRUCCIANI


Digital trust is core to our relationship with technology
DEEPIKA CHAUHAN


Digital identity – creating a unified system
FREDERIK MENNES


ChatGPT: The potential is clear, but what are the risks?
BRETT RAYBOULD


The importance of practice for cyber security incident response
GEMMA MOORE


Best practices for combatting malvertising attacks
TOM MCVEY


 

Volume 2023, Issue 9

Contents
Is your email security doing what it claims?
COLIN TANKARD


The digital frontier: defending the public sector against cyberthreats
ANAT GARTY


Top of the TTPs: Malware's most common tactics, techniques and procedures
DR SULEYMAN OZARSLAN


Five ways to use AI to prevent cyber attacks
DANIEL PEARSON


Generative AI: security implications for business automation
SCOTT WEEDON


Ramping up the response to browser-based attacks
TOM MCVEY


 

Volume 2023, Issue 8

Contents
The M-P of cyber security
KAREN RENAUD


The growing cyberthreat to critical national infrastructure
MARK HUGHES


Remote working is here to stay, but security issues persist
SOHAIL IQBAL


The shadow of 2022 is still shaping cyberthreats
COLIN SHEPPARD


Defensive cyber security: continuous controls enforcement and infrastructure hygiene
ADITYA SOOD


 

Volume 2023, Issue 7

Contents
Bridging the cyber skills gap
PAUL CARON


Protecting the UK's national infrastructure
TOM EGGLESTONE


Why zero trust should start at the endpoint
HENRY HARRISON


How SMBs can defeat the threat of ransomware
TYLER MOFFITT


Removing passwords doesn't remove risk
GEMMA MOORE


XeGroup's evolving attack methods
TOM MCVEY


 

Volume 2023, Issue 6

Contents
No mystery to encryption
COLIN TANKARD


Vulnerabilities and risk in smart vehicle automatic parking assist systems
MOHAMAD IBRAHIM, NADER SOHRABI SAFA


Improving your company's cyber security training
CHRYSTAL TAYLOR


Where identity governance really belongs
CENGIZ TUZTAS


Malware delivery is evolving through password-protected files
TOM MCVEY


 

Volume 2023, Issue 5

Contents
How the pharma industry can reinvent vulnerability management
SYLVAIN CORTES


Digital identity: healthcare's path forward
GUS MALEZIS


Has Twitter made a big mistake with 2FA?
LUKE POTTER


Enhancing cyber security at scale with ML/AI frameworks
BHARATHASIMHA REDDY, AMIT NAGAL, ADITYA K SOOD, RUTHVIK REDDY SL


Analysing four recent IcedID malware campaigns
TOM MCVEY

Volume 2023, Issue 4

Contents
Secure and resilient remote access is what really matters
ALAN STEWART-BROWN


The right balance between controls and teams
GEMMA MOORE


Weaponising ChatGPT
STEVE MANSFIELD-DEVINE


 

Volume 2023, Issue 3

Contents
NewsPenguin threatens Pakistan
DMITRY BESTUZHEV


Do you have too much security?
STEVE MANSFIELD-DEVINE


Is ChatGPT really a cyberthreat?
TOM MCVEY


 

Volume 2023, Issue 2

Contents
PKI – friend or foe?
COLIN TANKARD


Guilty of hiding a data breach
NIGEL JONES


Preparing for crisis: are you ready to be attacked?
LUKE KENNY


The nightmare of hard-coded credentials
THOMAS SEGURA


Tracing template injection attacks to North Korea
TOM MCVEY


 

Volume 2023, Issue 1

Contents
Awareness and layered defences
GEMMA MOORE


Responding to worsening web browser attacks
JONATHAN LEE


The law that is changing the telco sector for the better
BRYAN ROSS


Cloud databases: a breeding ground for ransomware
ADITYA K SOOD, MICHAEL WILEY


 

Volume 2022, Issue 12

Contents
Why businesses shouldn't rely on Istio's Mutual TLS
KEVIN BOCEK


Analysis of a new AD vulnerability
CHARLIE CLARK


How to deal with MFA bypass
BEN JACOB


Strengthening cyber security with digital twins
MAYA NATARAJAN

Volume 2022, Issue 11

Contents
Mission-critical data is more complex in a hybrid world
ROB ALLEN


Supply chain security – the biggest overlooked cyber risk
JAMES GRIFFITHS


Defence against the dark art of zero-day attacks
MATIAS MADOU


APIs – the hackers delight
COLIN TANKARD


Talking template injection attacks
TOM MCVEY

Volume 2022, Issue 10

Contents
Driving the legal GRC agenda in a brave new world of compliance
SIMON WHITBURN


What you don't know can hurt you
GEMMA MOORE


Rethinking endpoint management for the modern age
DAN RICHINGS


The threat from Russia continues to loom large
RICHARD STAYNINGS


DDoS – does size matter?
ASHLEY STEPHENSON


 

Volume 2022, Issue 9

Contents
Phishing campaign targets Japanese MICARD and Amex users
Tom McVey, Sales Engineer EMEA, Menlo Security


Phishing campaign targets Japanese MICARD and Amex users
TOM MCVEY


An improved filter against injection attacks using regex and machine learning
SUJAN CHEGU, GAUTAM U REDDY, BHARATH S BHAMBORE, KA ADEAB, PRASAD HONNAVALLI, SIVARAMAN ESWARAN


Driving best practice security in a hybrid working world
SIMON MULLIS


Is anti-virus software up to the job?
COLIN TANKARD

Volume 2022, Issue 8

Contents
Now is the time to strengthen cyber defences
MATIAS MADOU


Container attacks: a blast radius analysis
ASSAF MORAG


Industry 4.0: The security implications of operational technology
SACHIN SHAH


IBM: Cost of a Data Breach
STEVE MANSFIELD-DEVINE


Negotiating with ransomware gangs
TOM MCVEY