Volume 2023, Issue 12
Contents
AI – bedazzled by its allure, blinded to its risks
AKBER DATOO, JAKE POPE
Can vulnerability disclosure be timely, detailed and coordinated?
MICHAEL ISBITSKI
Domain phishing: staying a step ahead of the threats
BRIAN LONERGAN
Safeguarding legacy equipment
JEREMY WHITTINGHAM
How to strengthen the software supply chain
BRIAN TRZUPEK
Volume 2023, Issue 11
Contents
Improving risk management – combining security and cyber insurance practices
PAUL BAIRD
How to assess the impact of generative artificial intelligence
GRAHAM HOSKING
Encryption blind spots: shining a light on cloud network traffic
MARK JOW
The NIS 2 Directive: securing critical assets
STEVE KENNY
Volume 2023, Issue 10
Contents
Embracing an outcome-based approach to cyber security
PAUL BRUCCIANI
Digital trust is core to our relationship with technology
DEEPIKA CHAUHAN
Digital identity – creating a unified system
FREDERIK MENNES
ChatGPT: The potential is clear, but what are the risks?
BRETT RAYBOULD
The importance of practice for cyber security incident response
GEMMA MOORE
Best practices for combatting malvertising attacks
TOM MCVEY
Volume 2023, Issue 9
Contents
Is your email security doing what it claims?
COLIN TANKARD
The digital frontier: defending the public sector against cyberthreats
ANAT GARTY
Top of the TTPs: Malware's most common tactics, techniques and procedures
DR SULEYMAN OZARSLAN
Five ways to use AI to prevent cyber attacks
DANIEL PEARSON
Generative AI: security implications for business automation
SCOTT WEEDON
Ramping up the response to browser-based attacks
TOM MCVEY
Volume 2023, Issue 8
Contents
The M-P of cyber security
KAREN RENAUD
The growing cyberthreat to critical national infrastructure
MARK HUGHES
Remote working is here to stay, but security issues persist
SOHAIL IQBAL
The shadow of 2022 is still shaping cyberthreats
COLIN SHEPPARD
Defensive cyber security: continuous controls enforcement and infrastructure hygiene
ADITYA SOOD
Volume 2023, Issue 7
Contents
Bridging the cyber skills gap
PAUL CARON
Protecting the UK's national infrastructure
TOM EGGLESTONE
Why zero trust should start at the endpoint
HENRY HARRISON
How SMBs can defeat the threat of ransomware
TYLER MOFFITT
Removing passwords doesn't remove risk
GEMMA MOORE
XeGroup's evolving attack methods
TOM MCVEY
Volume 2023, Issue 6
Contents
No mystery to encryption
COLIN TANKARD
Vulnerabilities and risk in smart vehicle automatic parking assist systems
MOHAMAD IBRAHIM, NADER SOHRABI SAFA
Improving your company's cyber security training
CHRYSTAL TAYLOR
Where identity governance really belongs
CENGIZ TUZTAS
Malware delivery is evolving through password-protected files
TOM MCVEY
Volume 2023, Issue 5
Contents
How the pharma industry can reinvent vulnerability management
SYLVAIN CORTES
Digital identity: healthcare's path forward
GUS MALEZIS
Has Twitter made a big mistake with 2FA?
LUKE POTTER
Enhancing cyber security at scale with ML/AI frameworks
BHARATHASIMHA REDDY, AMIT NAGAL, ADITYA K SOOD, RUTHVIK REDDY SL
Analysing four recent IcedID malware campaigns
TOM MCVEY
Volume 2023, Issue 4
Contents
Secure and resilient remote access is what really matters
ALAN STEWART-BROWN
The right balance between controls and teams
GEMMA MOORE
Weaponising ChatGPT
STEVE MANSFIELD-DEVINE
Volume 2023, Issue 3
Contents
NewsPenguin threatens Pakistan
DMITRY BESTUZHEV
Do you have too much security?
STEVE MANSFIELD-DEVINE
Is ChatGPT really a cyberthreat?
TOM MCVEY
Volume 2023, Issue 2
Contents
PKI – friend or foe?
COLIN TANKARD
Guilty of hiding a data breach
NIGEL JONES
Preparing for crisis: are you ready to be attacked?
LUKE KENNY
The nightmare of hard-coded credentials
THOMAS SEGURA
Tracing template injection attacks to North Korea
TOM MCVEY
Volume 2023, Issue 1
Contents
Awareness and layered defences
GEMMA MOORE
Responding to worsening web browser attacks
JONATHAN LEE
The law that is changing the telco sector for the better
BRYAN ROSS
Cloud databases: a breeding ground for ransomware
ADITYA K SOOD, MICHAEL WILEY
Volume 2022, Issue 12
Contents
Why businesses shouldn't rely on Istio's Mutual TLS
KEVIN BOCEK
Analysis of a new AD vulnerability
CHARLIE CLARK
How to deal with MFA bypass
BEN JACOB
Strengthening cyber security with digital twins
MAYA NATARAJAN
Volume 2022, Issue 11
Contents
Mission-critical data is more complex in a hybrid world
ROB ALLEN
Supply chain security – the biggest overlooked cyber risk
JAMES GRIFFITHS
Defence against the dark art of zero-day attacks
MATIAS MADOU
APIs – the hackers delight
COLIN TANKARD
Talking template injection attacks
TOM MCVEY
Volume 2022, Issue 10
Contents
Driving the legal GRC agenda in a brave new world of compliance
SIMON WHITBURN
What you don't know can hurt you
GEMMA MOORE
Rethinking endpoint management for the modern age
DAN RICHINGS
The threat from Russia continues to loom large
RICHARD STAYNINGS
DDoS – does size matter?
ASHLEY STEPHENSON
Volume 2022, Issue 9
Contents
Phishing campaign targets Japanese MICARD and Amex users
Tom McVey, Sales Engineer EMEA, Menlo Security
Phishing campaign targets Japanese MICARD and Amex users
TOM MCVEY
An improved filter against injection attacks using regex and machine learning
SUJAN CHEGU, GAUTAM U REDDY, BHARATH S BHAMBORE, KA ADEAB, PRASAD HONNAVALLI, SIVARAMAN ESWARAN
Driving best practice security in a hybrid working world
SIMON MULLIS
Is anti-virus software up to the job?
COLIN TANKARD
Volume 2022, Issue 8
Contents
Now is the time to strengthen cyber defences
MATIAS MADOU
Container attacks: a blast radius analysis
ASSAF MORAG
Industry 4.0: The security implications of operational technology
SACHIN SHAH
IBM: Cost of a Data Breach
STEVE MANSFIELD-DEVINE
Negotiating with ransomware gangs
TOM MCVEY