Pub Date : 2023-10-01DOI: 10.12968/s1361-3723(23)70047-x
Chris Dimitriadis
No organisation is safe from ransomware, and the threat it poses is only becoming more widespread and severe. However, there are ways to prepare yourself for an attack, and for dealing with the consequences once it occurs. Being ready can significantly reduce the impact when ransomware strikes.
{"title":"Six steps to dealing with a ransomware attack","authors":"Chris Dimitriadis","doi":"10.12968/s1361-3723(23)70047-x","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70047-x","url":null,"abstract":"No organisation is safe from ransomware, and the threat it poses is only becoming more widespread and severe. However, there are ways to prepare yourself for an attack, and for dealing with the consequences once it occurs. Being ready can significantly reduce the impact when ransomware strikes.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-01DOI: 10.12968/s1361-3723(23)70048-1
Steven Furnell, Eliana Stavrou
Cyber security is now the concern and responsibility of everyone who uses technology, regardless of whether they are IT or security practitioners. And this needs to be reflected in education. There are many disciplines, not directly related to cyber security, where knowledge of the threats and the basic skills to combat them are becoming necessary if graduates are to fully contribute to a society safe from cyber risks.
{"title":"Assessing cyber security coverage in non-computing disciplines","authors":"Steven Furnell, Eliana Stavrou","doi":"10.12968/s1361-3723(23)70048-1","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70048-1","url":null,"abstract":"Cyber security is now the concern and responsibility of everyone who uses technology, regardless of whether they are IT or security practitioners. And this needs to be reflected in education. There are many disciplines, not directly related to cyber security, where knowledge of the threats and the basic skills to combat them are becoming necessary if graduates are to fully contribute to a society safe from cyber risks.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-01DOI: 10.12968/s1361-3723(23)70049-3
Simon Pamplin
Any companies still adopting a tech-first strategy for cyber security are entirely misunderstanding the intentions of global data protection regulation – and as a result are leaving both individuals and the business dangerously exposed. There are broader issues of data governance, including data sovereignty, that involve the whole of the organisation's management team.
{"title":"The challenges of data sovereignty","authors":"Simon Pamplin","doi":"10.12968/s1361-3723(23)70049-3","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70049-3","url":null,"abstract":"Any companies still adopting a tech-first strategy for cyber security are entirely misunderstanding the intentions of global data protection regulation – and as a result are leaving both individuals and the business dangerously exposed. There are broader issues of data governance, including data sovereignty, that involve the whole of the organisation's management team.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136128930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-01DOI: 10.12968/s1361-3723(23)70046-8
Pieter Danhieux
The cyber security of an organisation starts with the software it uses. And that places a responsibility on software vendors to ensure that the code they ship is intrinsically secure. And that security can't be added as an afterthought – it needs to be integrated deep into the development process.
{"title":"Improving national security through accountability","authors":"Pieter Danhieux","doi":"10.12968/s1361-3723(23)70046-8","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70046-8","url":null,"abstract":"The cyber security of an organisation starts with the software it uses. And that places a responsibility on software vendors to ensure that the code they ship is intrinsically secure. And that security can't be added as an afterthought – it needs to be integrated deep into the development process.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.12968/s1361-3723(23)70042-0
Jason Foster
It has become a truism that data is the lifeblood of any modern organisation. But to reap the maximum value from data, you have to use it – and that makes it vulnerable. But this means you should view implementing an effective data security as a business investment – unlocking the potential of your data while keeping the organisation safe.
{"title":"To get the best value out of data, you have to protect it","authors":"Jason Foster","doi":"10.12968/s1361-3723(23)70042-0","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70042-0","url":null,"abstract":"It has become a truism that data is the lifeblood of any modern organisation. But to reap the maximum value from data, you have to use it – and that makes it vulnerable. But this means you should view implementing an effective data security as a business investment – unlocking the potential of your data while keeping the organisation safe.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"373 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134916067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.12968/s1361-3723(23)70043-2
Jacques de la Rivière
Threat actors exhibit highly agile behaviour, capable of evolving and adapting as new vulnerabilities become evident. Most organisations, however, don't have the same kind of flexibility and are constantly fighting last year's battles. Network detection and response (NDR) solutions have arisen to tackle this problem, and now with the added power of artificial intelligence they have the potential to give organisations the ability to react and respond quickly to new threats.
{"title":"Adding AI to NDR in the face of current threats","authors":"Jacques de la Rivière","doi":"10.12968/s1361-3723(23)70043-2","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70043-2","url":null,"abstract":"Threat actors exhibit highly agile behaviour, capable of evolving and adapting as new vulnerabilities become evident. Most organisations, however, don't have the same kind of flexibility and are constantly fighting last year's battles. Network detection and response (NDR) solutions have arisen to tackle this problem, and now with the added power of artificial intelligence they have the potential to give organisations the ability to react and respond quickly to new threats.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134916068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.12968/s1361-3723(23)70045-6
Darren Williams
In the vast, ever-changing threat landscape that encompasses the cyber world, small-to-medium businesses (SMBs) find themselves in a particularly vulnerable position. The paradox of the digital economy is that while it opens unparalleled opportunities for SMBs, it also exposes them to a landscape of cyber security threats that are both complex and continually evolving.
{"title":"How providers can help SMBs navigate the rising tide of attacks","authors":"Darren Williams","doi":"10.12968/s1361-3723(23)70045-6","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70045-6","url":null,"abstract":"In the vast, ever-changing threat landscape that encompasses the cyber world, small-to-medium businesses (SMBs) find themselves in a particularly vulnerable position. The paradox of the digital economy is that while it opens unparalleled opportunities for SMBs, it also exposes them to a landscape of cyber security threats that are both complex and continually evolving.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134916065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.12968/s1361-3723(23)70041-9
Mark Cunningham-Dickie
The WannaCry and NotPetya attacks alerted the world to the massive disruption that can be caused by cyber attacks. They also highlighted weaknesses and a lack of investment in our defences. Since then, the threats we face have moved on, having become significantly more sophisticated not least due to the exploitation of artificial intelligence and machine learning. So are we ready for the next big attack?
{"title":"Are we ready for the next WannaCry?","authors":"Mark Cunningham-Dickie","doi":"10.12968/s1361-3723(23)70041-9","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70041-9","url":null,"abstract":"The WannaCry and NotPetya attacks alerted the world to the massive disruption that can be caused by cyber attacks. They also highlighted weaknesses and a lack of investment in our defences. Since then, the threats we face have moved on, having become significantly more sophisticated not least due to the exploitation of artificial intelligence and machine learning. So are we ready for the next big attack?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134916362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.12968/s1361-3723(23)70044-4
Bernard Montel
{"title":"The good and bad of generative AI","authors":"Bernard Montel","doi":"10.12968/s1361-3723(23)70044-4","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70044-4","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134916359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}