Pub Date : 2023-10-01DOI: 10.12968/s1353-4858(23)70050-0
Brett Raybould
ChatGPT is everywhere and organisations are frantically searching for ways to get on the bandwagon. And the technology has great potential for transforming business processes. But like so many technological innovations, this one is a two-edged sword. And that's because it also offers similar benefits to people with malicious intent. And being so new, the security weaknesses and ethical consequences of the technology have yet to be fully explored.
{"title":"ChatGPT: The potential is clear, but what are the risks?","authors":"Brett Raybould","doi":"10.12968/s1353-4858(23)70050-0","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70050-0","url":null,"abstract":"ChatGPT is everywhere and organisations are frantically searching for ways to get on the bandwagon. And the technology has great potential for transforming business processes. But like so many technological innovations, this one is a two-edged sword. And that's because it also offers similar benefits to people with malicious intent. And being so new, the security weaknesses and ethical consequences of the technology have yet to be fully explored.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.12968/s1353-4858(23)70045-7
Scott Weedon
AI tools such as ChatGPT certainly appear to offer significant benefits to organisations looking to save costs and improve efficiency. But the technology is being adopted with an enthusiasm that leaves little room for the careful consideration of potential security vulnerabilities. So how do you embrace this revolution without putting yourself at risk?
{"title":"Generative AI: security implications for business automation","authors":"Scott Weedon","doi":"10.12968/s1353-4858(23)70045-7","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70045-7","url":null,"abstract":"AI tools such as ChatGPT certainly appear to offer significant benefits to organisations looking to save costs and improve efficiency. But the technology is being adopted with an enthusiasm that leaves little room for the careful consideration of potential security vulnerabilities. So how do you embrace this revolution without putting yourself at risk?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134995404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.12968/s1353-4858(23)70043-3
Daniel Pearson
Artificial intelligence has the potential to plug the gaps in your website defences. At a time of limited budgets, constrained resources and a global skills shortage, AI is capable of taking over many previously labour-intensive tasks and of providing insight into threats and weaknesses. This article looks at five key ways in which AI offers a boost to your web security.
{"title":"Five ways to use AI to prevent cyber attacks","authors":"Daniel Pearson","doi":"10.12968/s1353-4858(23)70043-3","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70043-3","url":null,"abstract":"Artificial intelligence has the potential to plug the gaps in your website defences. At a time of limited budgets, constrained resources and a global skills shortage, AI is capable of taking over many previously labour-intensive tasks and of providing insight into threats and weaknesses. This article looks at five key ways in which AI offers a boost to your web security.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"47 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134994385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.12968/s1353-4858(23)70042-1
Suleyman Ozarslan
The first step in preventing malware from compromising your organisation is to understand how it works. There are many tactics, techniques and procedures (TTPs) employed by malware developers, but some are more common than others, and honing your security strategy, policies and systems to deal with the most frequent methods will significantly strengthen your defences.
{"title":"Top of the TTPs: Malware's most common tactics, techniques and procedures","authors":"Suleyman Ozarslan","doi":"10.12968/s1353-4858(23)70042-1","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70042-1","url":null,"abstract":"The first step in preventing malware from compromising your organisation is to understand how it works. There are many tactics, techniques and procedures (TTPs) employed by malware developers, but some are more common than others, and honing your security strategy, policies and systems to deal with the most frequent methods will significantly strengthen your defences.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134995078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.12968/s1353-4858(23)70044-5
Tom McVey
{"title":"Ramping up the response to browser-based attacks","authors":"Tom McVey","doi":"10.12968/s1353-4858(23)70044-5","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70044-5","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134994538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.12968/s1353-4858(23)70040-8
Colin Tankard
{"title":"Is your email security doing what it claims?","authors":"Colin Tankard","doi":"10.12968/s1353-4858(23)70040-8","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70040-8","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134994386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.12968/s1353-4858(23)70041-x
Anat Garty
Public sector organisations are on the front line when it comes to cyber attacks. They are enticing targets for both criminal and nation-state threat actors. And the systems they operate, as well as the information they hold, are often critical to the safety and security of the nation and its citizens. This raises the bar for these organisations when it comes to cyber security defences. So how do they reach it?
{"title":"The digital frontier: defending the public sector against cyberthreats","authors":"Anat Garty","doi":"10.12968/s1353-4858(23)70041-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70041-x","url":null,"abstract":"Public sector organisations are on the front line when it comes to cyber attacks. They are enticing targets for both criminal and nation-state threat actors. And the systems they operate, as well as the information they hold, are often critical to the safety and security of the nation and its citizens. This raises the bar for these organisations when it comes to cyber security defences. So how do they reach it?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134994923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-01DOI: 10.12968/s1353-4858(23)70037-8
Sohail Iqbal
The pandemic forced remote working on many organisations. Most have now adjusted and remote and hybrid working practices are well established. However, the security threats raised by this change linger, with many of the basic issues remaining unaddressed. It's time for organisations to catch up if they are to safely reap the many benefits that remote working offers.
{"title":"Remote working is here to stay, but security issues persist","authors":"Sohail Iqbal","doi":"10.12968/s1353-4858(23)70037-8","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70037-8","url":null,"abstract":"The pandemic forced remote working on many organisations. Most have now adjusted and remote and hybrid working practices are well established. However, the security threats raised by this change linger, with many of the basic issues remaining unaddressed. It's time for organisations to catch up if they are to safely reap the many benefits that remote working offers.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"66 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83433791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-01DOI: 10.12968/s1353-4858(23)70036-6
M. Hughes
There is no more attractive target for cyber attackers – especially those linked to nation states – than critical national infrastructure (CNI). Organisations working in sectors that comprise CNI are subject to attacks ranging from ransom attempts to cyber war. Governments are becoming increasingly nervous about these threats, but often left the industry itself to do something about them. So what are the threats, how are they evolving and what do we do about them?
{"title":"The growing cyberthreat to critical national infrastructure","authors":"M. Hughes","doi":"10.12968/s1353-4858(23)70036-6","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70036-6","url":null,"abstract":"There is no more attractive target for cyber attackers – especially those linked to nation states – than critical national infrastructure (CNI). Organisations working in sectors that comprise CNI are subject to attacks ranging from ransom attempts to cyber war. Governments are becoming increasingly nervous about these threats, but often left the industry itself to do something about them. So what are the threats, how are they evolving and what do we do about them?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"33 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81991162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}