Für unser junges Team suchen wir ab Juli oder August 2019 eine/n engagierte/n Praktikantin/Praktikanten. Wir bieten einen thematisch breit gefächerten Einblick in die Grundlagen der PR von mittelständischen Unternehmen und technologieorientierten Organisationen sowie in anspruchsvolle strategische Projekte großer Konzerne wie Amazon. Hier kannst du dir einen aktuellen Überblick über unsere Projekte verschaffen: www.headlineaffairs.de/news
{"title":"headline","authors":"Peter Sloman","doi":"10.1002/ncr.4110201202","DOIUrl":"https://doi.org/10.1002/ncr.4110201202","url":null,"abstract":"Für unser junges Team suchen wir ab Juli oder August 2019 eine/n engagierte/n Praktikantin/Praktikanten. Wir bieten einen thematisch breit gefächerten Einblick in die Grundlagen der PR von mittelständischen Unternehmen und technologieorientierten Organisationen sowie in anspruchsvolle strategische Projekte großer Konzerne wie Amazon. Hier kannst du dir einen aktuellen Überblick über unsere Projekte verschaffen: www.headlineaffairs.de/news","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"51 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73315433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-01DOI: 10.12968/s1353-4858(22)70056-6
C. Tankard
{"title":"Is anti-virus software up to the job?","authors":"C. Tankard","doi":"10.12968/s1353-4858(22)70056-6","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70056-6","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78637337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-01DOI: 10.12968/s1353-4858(22)70054-2
Thomas B. McVey
{"title":"Phishing campaign targets Japanese MICARD and Amex users","authors":"Thomas B. McVey","doi":"10.12968/s1353-4858(22)70054-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70054-2","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79741384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-01DOI: 10.12968/s1353-4858(22)70057-8
Simon Mullis
The UK is settling into its new hybrid working routine. This is introducing new cyber security challenges for organisations. To secure personal and sensitive data across this ever-growing, sprawling and increasingly insecure environment, organisations have stepped up their use of end-to-end encryption. But this has created visibility challenges for security and compliance teams. And to many IT security professionals, it feels like a Catch-22 as they try to secure the needs of this increasingly hybrid workforce.
{"title":"Driving best practice security in a hybrid working world","authors":"Simon Mullis","doi":"10.12968/s1353-4858(22)70057-8","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70057-8","url":null,"abstract":"The UK is settling into its new hybrid working routine. This is introducing new cyber security challenges for organisations. To secure personal and sensitive data across this ever-growing, sprawling and increasingly insecure environment, organisations have stepped up their use of end-to-end encryption. But this has created visibility challenges for security and compliance teams. And to many IT security professionals, it feels like a Catch-22 as they try to secure the needs of this increasingly hybrid workforce.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82713816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.12968/s1353-4858(22)70047-5
Matias Madou
Thanks in part to the Covid-19 pandemic, cybercrime is at an all-time high and many organisations are struggling to cope. A large number of companies have had to grapple with security strategies for the first time, and those that already had plans in place found them being tested to the full.
{"title":"Now is the time to strengthen cyber defences","authors":"Matias Madou","doi":"10.12968/s1353-4858(22)70047-5","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70047-5","url":null,"abstract":"Thanks in part to the Covid-19 pandemic, cybercrime is at an all-time high and many organisations are struggling to cope. A large number of companies have had to grapple with security strategies for the first time, and those that already had plans in place found them being tested to the full.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76747595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.12968/s1353-4858(22)70051-7
Thomas B. McVey
{"title":"Negotiating with ransomware gangs","authors":"Thomas B. McVey","doi":"10.12968/s1353-4858(22)70051-7","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70051-7","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83292424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.12968/s1353-4858(22)70050-5
Sachin Shah
Over the past several years, we have been experiencing the fourth industrial revolution, more commonly known as Industry 4.0. This evolution is being exacerbated by the influx of new technologies, advanced digitalisation, artificial intelligence, and the cloud, which is pushing the operational technology (OT) world into new realms with regards to security. Consequently, to achieve Industry 4.0, organisations must embrace the convergence between OT and information technology (IT), while understanding the vital role that cyber security plays throughout this process.
{"title":"Industry 4.0: The security implications of operational technology","authors":"Sachin Shah","doi":"10.12968/s1353-4858(22)70050-5","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70050-5","url":null,"abstract":"Over the past several years, we have been experiencing the fourth industrial revolution, more commonly known as Industry 4.0. This evolution is being exacerbated by the influx of new technologies, advanced digitalisation, artificial intelligence, and the cloud, which is pushing the operational technology (OT) world into new realms with regards to security. Consequently, to achieve Industry 4.0, organisations must embrace the convergence between OT and information technology (IT), while understanding the vital role that cyber security plays throughout this process.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78579763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.12968/s1353-4858(22)70049-9
Steve Mansfield-Devine
{"title":"IBM: Cost of a Data Breach","authors":"Steve Mansfield-Devine","doi":"10.12968/s1353-4858(22)70049-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70049-9","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88261869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.12968/s1353-4858(22)70048-7
Assaf Morag
Containers may seem to offer greater security through segregation. But they are increasingly becoming a focus for attackers looking to escape the confines of containers in order to move laterally across the system. This is typically achieved through maliciously crafted container images, as recent research using honeypots has shown.
{"title":"Container attacks: a blast radius analysis","authors":"Assaf Morag","doi":"10.12968/s1353-4858(22)70048-7","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70048-7","url":null,"abstract":"Containers may seem to offer greater security through segregation. But they are increasingly becoming a focus for attackers looking to escape the confines of containers in order to move laterally across the system. This is typically achieved through maliciously crafted container images, as recent research using honeypots has shown.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87396594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-01DOI: 10.12968/s1353-4858(22)70044-x
Gemma Moore
{"title":"Pen testing vs red teaming","authors":"Gemma Moore","doi":"10.12968/s1353-4858(22)70044-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70044-x","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"65 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74474957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}