Pub Date : 2023-08-01DOI: 10.12968/s1353-4858(23)70038-x
Colin Sheppard
Recent research has shown how the global events of 2022 are still affecting the nature of cyberthreats today and possibly into the future. This article takes a closer look at the findings and what they mean for businesses, including a detailed rundown of the most prevalent threats, methods and attack vectors used.
{"title":"The shadow of 2022 is still shaping cyberthreats","authors":"Colin Sheppard","doi":"10.12968/s1353-4858(23)70038-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70038-x","url":null,"abstract":"Recent research has shown how the global events of 2022 are still affecting the nature of cyberthreats today and possibly into the future. This article takes a closer look at the findings and what they mean for businesses, including a detailed rundown of the most prevalent threats, methods and attack vectors used.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"134 3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91076403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-01DOI: 10.12968/s1353-4858(23)70039-1
Aditya K. Sood
With the exponential rise in cyber attacks, organisations need to implement mature cyber security strategies for handling cyberthreats at scale and minimising the risk to the business. In this article, we look at the cyber security model of continuous assessment and controls enforcement (CACE), including the importance of maintaining infrastructure cyber hygiene.
{"title":"Defensive cyber security: continuous controls enforcement and infrastructure hygiene","authors":"Aditya K. Sood","doi":"10.12968/s1353-4858(23)70039-1","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70039-1","url":null,"abstract":"With the exponential rise in cyber attacks, organisations need to implement mature cyber security strategies for handling cyberthreats at scale and minimising the risk to the business. In this article, we look at the cyber security model of continuous assessment and controls enforcement (CACE), including the importance of maintaining infrastructure cyber hygiene.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"177 2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78151878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-01DOI: 10.12968/s1353-4858(23)70030-5
Tom Egglestone
Of all the industries targeted by cyber attackers, critical national infrastructure (CNI) is among the most concerning. The potential disruption not just to business but to our daily lives and even our physical safety means that governments, including the UK, are taking the threat seriously. But it's also important that individual organisations working in this area ramp up their cyber security and adopt a position of cyber resilience.
{"title":"Protecting the UK's national infrastructure","authors":"Tom Egglestone","doi":"10.12968/s1353-4858(23)70030-5","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70030-5","url":null,"abstract":"Of all the industries targeted by cyber attackers, critical national infrastructure (CNI) is among the most concerning. The potential disruption not just to business but to our daily lives and even our physical safety means that governments, including the UK, are taking the threat seriously. But it's also important that individual organisations working in this area ramp up their cyber security and adopt a position of cyber resilience.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"70 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83869398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-01DOI: 10.12968/s1353-4858(23)70033-0
Tyler Moffitt
Ransomware is not going away. In fact, it has become one of the most common and devastating forms of attack against organisations. Small and medium-size businesses (SMBs) are among the most vulnerable, as they often lack the resources to cope with a breach. But there are things they can do to improve their resilience.
{"title":"How SMBs can defeat the threat of ransomware","authors":"Tyler Moffitt","doi":"10.12968/s1353-4858(23)70033-0","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70033-0","url":null,"abstract":"Ransomware is not going away. In fact, it has become one of the most common and devastating forms of attack against organisations. Small and medium-size businesses (SMBs) are among the most vulnerable, as they often lack the resources to cope with a breach. But there are things they can do to improve their resilience.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73578197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-01DOI: 10.12968/s1353-4858(23)70029-9
Paul Caron
It has long been accepted that one of the greatest threats to your cyber security lies within your own organisation – your staff. Cyber security training is a challenge, as is keeping people aware of and alert to emerging threats. And this has been complicated further by new organisational structures and ways of working, in no small part imposed by the Covid pandemic. Solving this problem requires effort and investment.
{"title":"Bridging the cyber skills gap","authors":"Paul Caron","doi":"10.12968/s1353-4858(23)70029-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70029-9","url":null,"abstract":"It has long been accepted that one of the greatest threats to your cyber security lies within your own organisation – your staff. Cyber security training is a challenge, as is keeping people aware of and alert to emerging threats. And this has been complicated further by new organisational structures and ways of working, in no small part imposed by the Covid pandemic. Solving this problem requires effort and investment.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76147838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-01DOI: 10.12968/s1353-4858(23)70032-9
Henry b. Harrison
The zero-trust concept is rapidly growing in popularity, particularly with the rise of hybrid working practices and the continued erosion of the traditional network perimeter. But where do you start when implementing a zero-trust strategy?
{"title":"Why zero trust should start at the endpoint","authors":"Henry b. Harrison","doi":"10.12968/s1353-4858(23)70032-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70032-9","url":null,"abstract":"The zero-trust concept is rapidly growing in popularity, particularly with the rise of hybrid working practices and the continued erosion of the traditional network perimeter. But where do you start when implementing a zero-trust strategy?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"58 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81263093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-01DOI: 10.12968/s1353-4858(23)70028-7
Cengiz Tuztas
When companies decide to initiate an identity governance and administration (IGA) project, it raises a number of questions. This primarily concerns the selection of products and solutions to manage digital identities and the permissions associated with them. Sometimes, however, it is helpful to take a step back and examine the extent to which the prerequisites for comprehensive governance are actually in place and where this should start from – because a number of others are grouped around the concept of identity and not necessarily uniformly or sharply.
{"title":"Where identity governance really belongs","authors":"Cengiz Tuztas","doi":"10.12968/s1353-4858(23)70028-7","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70028-7","url":null,"abstract":"When companies decide to initiate an identity governance and administration (IGA) project, it raises a number of questions. This primarily concerns the selection of products and solutions to manage digital identities and the permissions associated with them. Sometimes, however, it is helpful to take a step back and examine the extent to which the prerequisites for comprehensive governance are actually in place and where this should start from – because a number of others are grouped around the concept of identity and not necessarily uniformly or sharply.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80252982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}