Pub Date : 2022-07-01DOI: 10.12968/s1353-4858(22)70052-9
Anthony Ricci
Business processes have always been built on trust, and as digital transformation moves more devices and people online, the need for digital trust is rapidly increasing. Today, being able to trust the identity of endpoints, the people using them, and their data and documents, is fundamental to society.
{"title":"The biggest challenges of manually managing PKI certificates","authors":"Anthony Ricci","doi":"10.12968/s1353-4858(22)70052-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70052-9","url":null,"abstract":"Business processes have always been built on trust, and as digital transformation moves more devices and people online, the need for digital trust is rapidly increasing. Today, being able to trust the identity of endpoints, the people using them, and their data and documents, is fundamental to society.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"138 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86514774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-01DOI: 10.12968/s1353-4858(22)70046-3
Gabriela Ahmadi-Assalemi, Haider M. Al-Khateeb, Amar Aggoun
Digital twin technologies – comprised of data-rich models and machine learning – allow the operators of smart city applications to gain an accurate representation of complex cyber-physical models. However, the implicit need for resilient data protection must be achieved by integrating privacy-preserving mechanisms into the DT system design as part of an effective defence-in-depth strategy.
{"title":"Privacy-enhancing technologies in the design of digital twins for smart cities","authors":"Gabriela Ahmadi-Assalemi, Haider M. Al-Khateeb, Amar Aggoun","doi":"10.12968/s1353-4858(22)70046-3","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70046-3","url":null,"abstract":"Digital twin technologies – comprised of data-rich models and machine learning – allow the operators of smart city applications to gain an accurate representation of complex cyber-physical models. However, the implicit need for resilient data protection must be achieved by integrating privacy-preserving mechanisms into the DT system design as part of an effective defence-in-depth strategy.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75341216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-01DOI: 10.12968/s1353-4858(22)70045-1
Jonas Iggbom
Entering traditional passwords on a website is not uncommon and most people have at least one. But as our digital reliance increases and cyber criminals become more tech savvy, passwords may not be suitable as our primary form of authentication in the future.
{"title":"Zero-trust architecture is creating a passwordless society","authors":"Jonas Iggbom","doi":"10.12968/s1353-4858(22)70045-1","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70045-1","url":null,"abstract":"Entering traditional passwords on a website is not uncommon and most people have at least one. But as our digital reliance increases and cyber criminals become more tech savvy, passwords may not be suitable as our primary form of authentication in the future.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"89 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80695708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.12968/s1353-4858(22)70040-2
C. Tankard
{"title":"The case for threat modelling","authors":"C. Tankard","doi":"10.12968/s1353-4858(22)70040-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70040-2","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"54 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75317132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.12968/s1353-4858(22)70041-4
N. Howe
Security service edge (SSE) solutions are designed to address the fundamental security challenges that organisations face in the era of hybrid work, applications in multi-cloud environments, edge computing, and digitisation of their operational technology (OT). But how do you select the right solution?
{"title":"Security service edge: choosing the right solution","authors":"N. Howe","doi":"10.12968/s1353-4858(22)70041-4","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70041-4","url":null,"abstract":"Security service edge (SSE) solutions are designed to address the fundamental security challenges that organisations face in the era of hybrid work, applications in multi-cloud environments, edge computing, and digitisation of their operational technology (OT). But how do you select the right solution?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"155 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76891826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.12968/s1353-4858(22)70043-8
Scot Sturges
With the convergence of the physical and digital worlds comes a heightened risk of security threats. Cyber security can no longer be placed on the back burner as organisations continue to incorporate physical security solutions; the likelihood and severity of an information breach rise dramatically as additional devices are contributed to one ubiquitous network.
{"title":"The great security convergence: joining physical devices and cyber security","authors":"Scot Sturges","doi":"10.12968/s1353-4858(22)70043-8","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70043-8","url":null,"abstract":"With the convergence of the physical and digital worlds comes a heightened risk of security threats. Cyber security can no longer be placed on the back burner as organisations continue to incorporate physical security solutions; the likelihood and severity of an information breach rise dramatically as additional devices are contributed to one ubiquitous network.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"35 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83286905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.12968/s1353-4858(22)70042-6
Bharathasimha Reddy D, Srilekha Talluri, Ruthvik Reddy SL, Amit Nagal, Aditya K. Sood
Cyber attacks are occurring at an exponential rate. Adversaries are opting for advanced techniques to abuse network protocols for conducting unauthorised operations. Domain generation algorithms (DGAs) are designed by malware authors to trigger malicious DNS communication. This article looks at the current state of DNS-based threats and how to detect DGA-based malicious DNS communication.
{"title":"DGAs die hard: detecting malicious domains using AI","authors":"Bharathasimha Reddy D, Srilekha Talluri, Ruthvik Reddy SL, Amit Nagal, Aditya K. Sood","doi":"10.12968/s1353-4858(22)70042-6","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70042-6","url":null,"abstract":"Cyber attacks are occurring at an exponential rate. Adversaries are opting for advanced techniques to abuse network protocols for conducting unauthorised operations. Domain generation algorithms (DGAs) are designed by malware authors to trigger malicious DNS communication. This article looks at the current state of DNS-based threats and how to detect DGA-based malicious DNS communication.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74386346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-01DOI: 10.12968/s1353-4858(22)70038-4
Thomas B. McVey
{"title":"The challenges of Log4j – and how to solve them","authors":"Thomas B. McVey","doi":"10.12968/s1353-4858(22)70038-4","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70038-4","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77558375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-01DOI: 10.12968/s1353-4858(22)70039-6
Michael Wood
Widespread remote working has meant that organisations must be able to provide a high level of accessibility to users scattered across potentially thousands of individual locations. They must also deliver a high level of security assurance against threat actors seeking to take advantage of more diffuse networks.
{"title":"Safeguard the future of your network","authors":"Michael Wood","doi":"10.12968/s1353-4858(22)70039-6","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70039-6","url":null,"abstract":"Widespread remote working has meant that organisations must be able to provide a high level of accessibility to users scattered across potentially thousands of individual locations. They must also deliver a high level of security assurance against threat actors seeking to take advantage of more diffuse networks.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88429842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}