首页 > 最新文献

Network Security最新文献

英文 中文
Secure and resilient remote access is what really matters 安全且有弹性的远程访问才是真正重要的
Pub Date : 2023-04-01 DOI: 10.12968/s1353-4858(23)70015-9
Alan Stewart-Brown
Forget the ‘edge vs cloud’ debate. These technologies each have their place, but they are both vulnerable to certain kinds of threats. And it is these risks that should be front of mind – especially for organisations adapting to new kinds of working.
忘掉“边缘vs云”的争论吧。这些技术都有自己的位置,但它们都容易受到某些类型的威胁。而这些风险正是我们应该首先考虑的——尤其是那些正在适应新型工作方式的组织。
{"title":"Secure and resilient remote access is what really matters","authors":"Alan Stewart-Brown","doi":"10.12968/s1353-4858(23)70015-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70015-9","url":null,"abstract":"Forget the ‘edge vs cloud’ debate. These technologies each have their place, but they are both vulnerable to certain kinds of threats. And it is these risks that should be front of mind – especially for organisations adapting to new kinds of working.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"102 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86031546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tackling new and emerging threats 应对新出现的威胁
Pub Date : 2023-04-01 DOI: 10.12968/s1353-4858(23)70018-4
J. Pescatore
The threat landscape is never static. If you are to stay one jump ahead of attackers, you need to evolve your defences – with threat awareness and education being among our most important defences.
威胁形势从来都不是一成不变的。如果你想比攻击者领先一步,你需要改进你的防御——威胁意识和教育是我们最重要的防御之一。
{"title":"Tackling new and emerging threats","authors":"J. Pescatore","doi":"10.12968/s1353-4858(23)70018-4","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70018-4","url":null,"abstract":"The threat landscape is never static. If you are to stay one jump ahead of attackers, you need to evolve your defences – with threat awareness and education being among our most important defences.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"118 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82487949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The right balance between controls and teams 控制和团队之间的适当平衡
Pub Date : 2023-04-01 DOI: 10.12968/s1353-4858(23)70016-0
Gemma Moore
{"title":"The right balance between controls and teams","authors":"Gemma Moore","doi":"10.12968/s1353-4858(23)70016-0","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70016-0","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79838898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Do you have too much security? 你有太多的安全措施吗?
Pub Date : 2023-03-01 DOI: 10.12968/s1353-4858(23)70013-5
Steve Mansfield-Devine
Organisations seem to accumulate cyber security solutions, to the point where they become difficult to use and it becomes impossible to ensure that they are operating efficiently. The result can be unnecessary and expensive duplication as well as unseen gaps that leave you vulnerable to attack.
组织似乎积累了大量的网络安全解决方案,以至于它们变得难以使用,而且不可能确保它们有效运行。结果可能是不必要和昂贵的重复,以及使您容易受到攻击的看不见的漏洞。
{"title":"Do you have too much security?","authors":"Steve Mansfield-Devine","doi":"10.12968/s1353-4858(23)70013-5","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70013-5","url":null,"abstract":"Organisations seem to accumulate cyber security solutions, to the point where they become difficult to use and it becomes impossible to ensure that they are operating efficiently. The result can be unnecessary and expensive duplication as well as unseen gaps that leave you vulnerable to attack.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"43 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73308722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Is ChatGPT really a cyberthreat? ChatGPT真的是网络威胁吗?
Pub Date : 2023-03-01 DOI: 10.12968/s1353-4858(23)70014-7
Thomas B. McVey
{"title":"Is ChatGPT really a cyberthreat?","authors":"Thomas B. McVey","doi":"10.12968/s1353-4858(23)70014-7","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70014-7","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78791647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NewsPenguin threatens Pakistan 巴布亚新几内亚威胁巴基斯坦
Pub Date : 2023-03-01 DOI: 10.12968/s1353-4858(23)70012-3
Dmitry Bestuzhev
NewsPenguin is a previously unknown threat actor, targeting Pakistan with an advanced espionage tool. The group's campaign seemed to be geared to targeting visitors to a major trade show. However, an analysis of its techniques and technologies throws some interesting light on how targeted attacks are being deployed.
NewsPenguin是一个以前不为人知的威胁行为者,用先进的间谍工具瞄准巴基斯坦。该组织的活动似乎是针对大型贸易展的参观者。然而,对其技术和技术的分析为如何部署针对性攻击提供了一些有趣的线索。
{"title":"NewsPenguin threatens Pakistan","authors":"Dmitry Bestuzhev","doi":"10.12968/s1353-4858(23)70012-3","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70012-3","url":null,"abstract":"NewsPenguin is a previously unknown threat actor, targeting Pakistan with an advanced espionage tool. The group's campaign seemed to be geared to targeting visitors to a major trade show. However, an analysis of its techniques and technologies throws some interesting light on how targeted attacks are being deployed.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76240532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preparing for crisis: are you ready to be attacked? 为危机做准备:你准备好被攻击了吗?
Pub Date : 2023-02-01 DOI: 10.12968/s1353-4858(23)70009-3
Luke Kenny
How can you tell if your organisation is really prepared for a cyber attack? Focusing too heavily on technological solutions can result in key aspects being overlooked – including the necessary skills and awareness among your staff and whether you have the right processes in place, and the people ready and prepared to use them, in case of an attack.
你如何判断你的组织是否真的为网络攻击做好了准备?过于关注技术解决方案可能会导致关键方面被忽视——包括员工的必要技能和意识,以及您是否有正确的流程,以及人们是否准备好了在发生攻击时使用它们。
{"title":"Preparing for crisis: are you ready to be attacked?","authors":"Luke Kenny","doi":"10.12968/s1353-4858(23)70009-3","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70009-3","url":null,"abstract":"How can you tell if your organisation is really prepared for a cyber attack? Focusing too heavily on technological solutions can result in key aspects being overlooked – including the necessary skills and awareness among your staff and whether you have the right processes in place, and the people ready and prepared to use them, in case of an attack.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"62 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86042679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The nightmare of hard-coded credentials 硬编码凭证的噩梦
Pub Date : 2023-02-01 DOI: 10.12968/s1353-4858(23)70010-x
Thomas Segura
With increasing threats from cybercrime and state-sponsored actors around the world, companies need to focus their defence resources on elements that can most cost-effectively reduce their security debt and advance their DevSecOps maturity. Detecting hard-coded secrets in source code is a preventive tactic that greatly increases the cost to the attacker by removing the low-hanging fruits first. But this requires a strategic approach to preserve application security teams’ operational capacity.
随着世界各地网络犯罪和国家支持的行为者的威胁日益增加,企业需要将其防御资源集中在最具成本效益的元素上,以减少其安全债务,并提高其DevSecOps成熟度。检测源代码中的硬编码秘密是一种预防性策略,通过先移除容易得到的秘密,大大增加了攻击者的代价。但是这需要一种战略方法来保持应用程序安全团队的操作能力。
{"title":"The nightmare of hard-coded credentials","authors":"Thomas Segura","doi":"10.12968/s1353-4858(23)70010-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70010-x","url":null,"abstract":"With increasing threats from cybercrime and state-sponsored actors around the world, companies need to focus their defence resources on elements that can most cost-effectively reduce their security debt and advance their DevSecOps maturity. Detecting hard-coded secrets in source code is a preventive tactic that greatly increases the cost to the attacker by removing the low-hanging fruits first. But this requires a strategic approach to preserve application security teams’ operational capacity.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"216 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77120765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Guilty of hiding a data breach 隐瞒数据泄露的罪名成立
Pub Date : 2023-02-01 DOI: 10.12968/s1353-4858(23)70008-1
Nigel Jones
What does the criminal conviction of Uber's former CISO mean for the information security sector? The case highlights the need for CISOs to ensure that they have a clear line to the board, and a robust plan for how to deal with security incidents ahead of time.
优步(Uber)前首席信息安全官被刑事定罪,对信息安全行业意味着什么?这个案例强调了ciso需要确保他们与董事会有明确的联系,以及如何提前处理安全事件的健全计划。
{"title":"Guilty of hiding a data breach","authors":"Nigel Jones","doi":"10.12968/s1353-4858(23)70008-1","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70008-1","url":null,"abstract":"What does the criminal conviction of Uber's former CISO mean for the information security sector? The case highlights the need for CISOs to ensure that they have a clear line to the board, and a robust plan for how to deal with security incidents ahead of time.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81272571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PKI – friend or foe? PKI是敌是友?
Pub Date : 2023-02-01 DOI: 10.12968/s1353-4858(23)70007-x
C. Tankard
{"title":"PKI – friend or foe?","authors":"C. Tankard","doi":"10.12968/s1353-4858(23)70007-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70007-x","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"527 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86907430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Network Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1