Pub Date : 2024-05-01DOI: 10.12968/s1353-4858(24)70021-x
Steve Mansfield-Devine
The UK's businesses and charities could be sitting ducks, according to the Government's latest ‘Cyber Security Breaches Survey’. Too many organisations are failing to deploy even the most basic cyber security measures. Equally, few are prepared for the new wave of AI-driven attacks or the consequences of being breached.
{"title":"Poor cyber hygiene puts the UK at risk","authors":"Steve Mansfield-Devine","doi":"10.12968/s1353-4858(24)70021-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70021-x","url":null,"abstract":"The UK's businesses and charities could be sitting ducks, according to the Government's latest ‘Cyber Security Breaches Survey’. Too many organisations are failing to deploy even the most basic cyber security measures. Equally, few are prepared for the new wave of AI-driven attacks or the consequences of being breached.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141032321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-01DOI: 10.12968/s1353-4858(23)70063-9
Brian Lonergan
Domain hijacking and cybersquatting have become popular techniques among threat actors, especially those engaged in phishing. Organisations need to pay attention to domain security – to protect themselves and their partners and customers. Fortunately, there are tools organisations can use to keep their domains, and their brands, safe.
{"title":"Domain phishing: staying a step ahead of the threats","authors":"Brian Lonergan","doi":"10.12968/s1353-4858(23)70063-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70063-9","url":null,"abstract":"Domain hijacking and cybersquatting have become popular techniques among threat actors, especially those engaged in phishing. Organisations need to pay attention to domain security – to protect themselves and their partners and customers. Fortunately, there are tools organisations can use to keep their domains, and their brands, safe.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"407 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139020182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-01DOI: 10.12968/s1353-4858(23)70062-7
Michael Isbitski
Vulnerability disclosure is a tricky subject. Organisations need early and detailed information about vulnerabilities in order to fix them. At the same time, threat actors can use the same information to develop exploits that could devastate organisations that don't move fast enough to protect themselves. So how can we balance the need for disclosure against the threats posed?
{"title":"Can vulnerability disclosure be timely, detailed and coordinated?","authors":"Michael Isbitski","doi":"10.12968/s1353-4858(23)70062-7","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70062-7","url":null,"abstract":"Vulnerability disclosure is a tricky subject. Organisations need early and detailed information about vulnerabilities in order to fix them. At the same time, threat actors can use the same information to develop exploits that could devastate organisations that don't move fast enough to protect themselves. So how can we balance the need for disclosure against the threats posed?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"137 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139021625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-01DOI: 10.12968/s1353-4858(23)70061-5
Brian Trzupek
Defenders against software supply chain attacks have to keep upping their game, as the attackers do.
软件供应链攻击的防御者必须与攻击者一样,不断提高自己的游戏水平。
{"title":"How to strengthen the software supply chain","authors":"Brian Trzupek","doi":"10.12968/s1353-4858(23)70061-5","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70061-5","url":null,"abstract":"Defenders against software supply chain attacks have to keep upping their game, as the attackers do.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"674 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139023465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-01DOI: 10.12968/s1353-4858(23)70060-3
Akber Datoo, Jake Pope
You can't escape generative AI. It is being applied to so many parts of our lives and is the source of much excitement and speculation. But how many organisations fully understand its ramifications? It seems that few have properly delineated policies and standards for its application, and this could lead to serious problems.
{"title":"AI – bedazzled by its allure, blinded to its risks","authors":"Akber Datoo, Jake Pope","doi":"10.12968/s1353-4858(23)70060-3","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70060-3","url":null,"abstract":"You can't escape generative AI. It is being applied to so many parts of our lives and is the source of much excitement and speculation. But how many organisations fully understand its ramifications? It seems that few have properly delineated policies and standards for its application, and this could lead to serious problems.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"90 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139017278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-01DOI: 10.12968/s1353-4858(23)70064-0
Jeremy Whittingham
Manufacturers are frequently saddled with outdated technology and ageing equipment, making them uniquely vulnerable in the digital age. By understanding the implications and proactive steps that can be taken, manufacturers can protect their critical assets and ensure the integrity of their production processes.
{"title":"Safeguarding legacy equipment","authors":"Jeremy Whittingham","doi":"10.12968/s1353-4858(23)70064-0","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70064-0","url":null,"abstract":"Manufacturers are frequently saddled with outdated technology and ageing equipment, making them uniquely vulnerable in the digital age. By understanding the implications and proactive steps that can be taken, manufacturers can protect their critical assets and ensure the integrity of their production processes.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"494 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139023619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-01DOI: 10.12968/s1353-4858(23)70047-0
Deepika Chauhan
Technology is now so central to our lives and to our businesses that it's essential that we can trust it. If we overlook this critical relationship, we stand in danger of being undermined or betrayed by the technology due to vulnerabilities and flaws, and we can never utilise it to its maximum potential. But how do you go about defining and achieving digital trust?
{"title":"Digital trust is core to our relationship with technology","authors":"Deepika Chauhan","doi":"10.12968/s1353-4858(23)70047-0","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70047-0","url":null,"abstract":"Technology is now so central to our lives and to our businesses that it's essential that we can trust it. If we overlook this critical relationship, we stand in danger of being undermined or betrayed by the technology due to vulnerabilities and flaws, and we can never utilise it to its maximum potential. But how do you go about defining and achieving digital trust?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-01DOI: 10.12968/s1353-4858(23)70046-9
Paul Brucciani
Cyber security is often seen as an activity separate from an organisation's main business processes. It is something that only comes to the fore when an incident occurs – which may be too late. And this can create a gap between the true security needs of the organisation and its security posture. In contrast, outcome-based security creates direct links between business goals and security requirements.
{"title":"Embracing an outcome-based approach to cyber security","authors":"Paul Brucciani","doi":"10.12968/s1353-4858(23)70046-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70046-9","url":null,"abstract":"Cyber security is often seen as an activity separate from an organisation's main business processes. It is something that only comes to the fore when an incident occurs – which may be too late. And this can create a gap between the true security needs of the organisation and its security posture. In contrast, outcome-based security creates direct links between business goals and security requirements.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-01DOI: 10.12968/s1353-4858(23)70048-2
Gemma Moore
{"title":"The importance of practice for cyber security incident response","authors":"Gemma Moore","doi":"10.12968/s1353-4858(23)70048-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70048-2","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"33 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}