Pub Date : 2024-06-01DOI: 10.12968/s1353-4858(24)70023-3
Monique Becenti
NIS2 will soon come into force all over the EU and – much like the GDPR – it threatens large fines for those that don’t comply. However, it may serve as a much-needed wake up call for those who are overlooking the fastest-growing part of their attack surface – the mobile device.
{"title":"Interconnection, NIS2 and the mobile device","authors":"Monique Becenti","doi":"10.12968/s1353-4858(24)70023-3","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70023-3","url":null,"abstract":"NIS2 will soon come into force all over the EU and – much like the GDPR – it threatens large fines for those that don’t comply. However, it may serve as a much-needed wake up call for those who are overlooking the fastest-growing part of their attack surface – the mobile device.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"198 S583","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141413566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-01DOI: 10.12968/s1353-4858(24)70026-9
Vincent Lomba
Cyber attacks are on the increase, in terms of both the number of attacks and the damage they cause. Encouraging organisations to improve their cyber security has had only a limited effect. Now it’s the turn of legislation and regulation, with the Cyber Resilience Act (CRA) and Network and Information Security Directive (NIS2) coming into force in the EU. But what kind of impact are they likely to have?
{"title":"Is new legislation the answer to curbing cybercrime?","authors":"Vincent Lomba","doi":"10.12968/s1353-4858(24)70026-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70026-9","url":null,"abstract":"Cyber attacks are on the increase, in terms of both the number of attacks and the damage they cause. Encouraging organisations to improve their cyber security has had only a limited effect. Now it’s the turn of legislation and regulation, with the Cyber Resilience Act (CRA) and Network and Information Security Directive (NIS2) coming into force in the EU. But what kind of impact are they likely to have?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"87 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141408782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-01DOI: 10.12968/s1353-4858(24)70024-5
Brendan Walsh
Networks are becoming ever-more complex, and people with the right skills to manage them securely are in desperately short supply. However, with the right network management environment – one that supports automation and operational efficiency – supported by relevant training, you can make your networks more resilient to current and future threats.
{"title":"Enhancing network resilience against growing cyberthreats","authors":"Brendan Walsh","doi":"10.12968/s1353-4858(24)70024-5","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70024-5","url":null,"abstract":"Networks are becoming ever-more complex, and people with the right skills to manage them securely are in desperately short supply. However, with the right network management environment – one that supports automation and operational efficiency – supported by relevant training, you can make your networks more resilient to current and future threats.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"43 24","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141403489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-01DOI: 10.12968/s1353-4858(24)70028-2
Chris Waynforth
UK organisations – and perhaps most notably the National Health Service (NHS) – are the focus of serious overhauls in IT provision and strategy. But it seems that far too little of the effort and expense is geared towards security. While increased efficiency and productivity are important, any gains in those areas are doomed to be undermined if security is not an intrinsic part of IT improvement programmes.
英国各机构,尤其是国家医疗卫生服务系统(NHS),都是信息技术供应和战略全面改革的重点。但是,在安全方面所做的努力和花费似乎太少了。提高效率和生产力固然重要,但如果不将安全作为 IT 改进计划的固有组成部分,那么在这些领域取得的任何成果都注定会被削弱。
{"title":"Cyber threats and key mitigation strategies","authors":"Chris Waynforth","doi":"10.12968/s1353-4858(24)70028-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70028-2","url":null,"abstract":"UK organisations – and perhaps most notably the National Health Service (NHS) – are the focus of serious overhauls in IT provision and strategy. But it seems that far too little of the effort and expense is geared towards security. While increased efficiency and productivity are important, any gains in those areas are doomed to be undermined if security is not an intrinsic part of IT improvement programmes.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"58 S8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141391156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-01DOI: 10.12968/s1353-4858(24)70025-7
Dominic Carroll
A cyber attack can have particularly devastating results on manufacturing organisations. More than half have turned to external providers to fully manage their security, while many more outsource at least some operations. But are the security service providers up to the task? And how can a manufacturer better align security with the organisation and its specific requirements?
{"title":"Ensuring that cyber security is fit for the future of manufacturing","authors":"Dominic Carroll","doi":"10.12968/s1353-4858(24)70025-7","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70025-7","url":null,"abstract":"A cyber attack can have particularly devastating results on manufacturing organisations. More than half have turned to external providers to fully manage their security, while many more outsource at least some operations. But are the security service providers up to the task? And how can a manufacturer better align security with the organisation and its specific requirements?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"196 S567","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141413584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-01DOI: 10.12968/s1353-4858(24)70022-1
Ben Walker
It's no secret that threat actors are enthusiastically adopting generative AI systems to help them launch more-effective cyber attacks. Fortunately, it's possible to fight AI with AI. There are new tools becoming available to help organisations protect their data and networks. But you need to know where to use them, when to use them and which are the most appropriate tools for each task.
{"title":"Minimising the risks and maximising the opportunities of generative AI","authors":"Ben Walker","doi":"10.12968/s1353-4858(24)70022-1","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70022-1","url":null,"abstract":"It's no secret that threat actors are enthusiastically adopting generative AI systems to help them launch more-effective cyber attacks. Fortunately, it's possible to fight AI with AI. There are new tools becoming available to help organisations protect their data and networks. But you need to know where to use them, when to use them and which are the most appropriate tools for each task.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"7 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141029340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-01DOI: 10.12968/s1353-4858(24)70020-8
Tomer Nahum, Eric Woodruff
An attack method used to forge identities by faking Security Assertion Markup Language (SAML) has been with us for years. But now threat actors have raised their game, targeting Microsoft's Entra ID service, which is extensively used by major cloud services.
通过伪造安全断言标记语言(SAML)来伪造身份的攻击方法已经存在多年。但现在,威胁行为者提高了他们的游戏水平,将目标对准了微软的 Entra ID 服务,该服务被各大云服务广泛使用。
{"title":"Forging identity in the cloud – dissecting Silver SAML","authors":"Tomer Nahum, Eric Woodruff","doi":"10.12968/s1353-4858(24)70020-8","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70020-8","url":null,"abstract":"An attack method used to forge identities by faking Security Assertion Markup Language (SAML) has been with us for years. But now threat actors have raised their game, targeting Microsoft's Entra ID service, which is extensively used by major cloud services.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"137 18","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141034262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-01DOI: 10.12968/s1353-4858(24)70019-1
Richard Menear
It's easy – perhaps too easy – to see cyber security as a technical issue. In fact, it's something that requires human effort from everyone within the organisation. It's something that needs to be baked in to every process, and every person needs to understand the risks and how to deal with them. This article look at the importance of positive cyber hygiene within businesses and how leaders can effectively create a culture of cyber security awareness.
{"title":"Building a human firewall to keep your organisation secure","authors":"Richard Menear","doi":"10.12968/s1353-4858(24)70019-1","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70019-1","url":null,"abstract":"It's easy – perhaps too easy – to see cyber security as a technical issue. In fact, it's something that requires human effort from everyone within the organisation. It's something that needs to be baked in to every process, and every person needs to understand the risks and how to deal with them. This article look at the importance of positive cyber hygiene within businesses and how leaders can effectively create a culture of cyber security awareness.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"78 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141045624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-01DOI: 10.12968/s1353-4858(24)70018-x
Nils Gerhardt
The adoption of the Industry 4.0 paradigm means embracing all the benefits that the most advanced technologies can bring. Yet manufacturing remains the most-attacked sector in cyber, and those same technologies could massively increase organisations’ threat surfaces, putting many of them at severe risk. It's essential that cyber security becomes an intrinsic part of any company's Industry 4.0 strategy.
{"title":"Putting cyber-safety first for Industry 4.0","authors":"Nils Gerhardt","doi":"10.12968/s1353-4858(24)70018-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70018-x","url":null,"abstract":"The adoption of the Industry 4.0 paradigm means embracing all the benefits that the most advanced technologies can bring. Yet manufacturing remains the most-attacked sector in cyber, and those same technologies could massively increase organisations’ threat surfaces, putting many of them at severe risk. It's essential that cyber security becomes an intrinsic part of any company's Industry 4.0 strategy.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"5 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141023682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}