Pub Date : 2022-03-01DOI: 10.12968/s1361-3723(22)70565-9
Jason Pugh
Many businesses have proven themselves to be resilient and innovative in the light of Covid-19. Any stigma associated with remote working has long since been consigned to history. However, one fly in the ointment can be getting documents signed and/or witnessed, which has thrown a light on electronic signatures. E-signatures can, when used appropriately, provide a simple and elegant solution to an issue that has been exacerbated by Covid but which will continue to be an issue in the post-pandemic world.
{"title":"Electronic-signatures – elegant solution or operational risk?","authors":"Jason Pugh","doi":"10.12968/s1361-3723(22)70565-9","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70565-9","url":null,"abstract":"Many businesses have proven themselves to be resilient and innovative in the light of Covid-19. Any stigma associated with remote working has long since been consigned to history. However, one fly in the ointment can be getting documents signed and/or witnessed, which has thrown a light on electronic signatures. E-signatures can, when used appropriately, provide a simple and elegant solution to an issue that has been exacerbated by Covid but which will continue to be an issue in the post-pandemic world.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"54 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84994237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-01DOI: 10.12968/s1361-3723(22)70560-x
Biar Koshnaw, S. Furnell
The pandemic has significantly changed the way we work, and many organisations were not prepared for that shift. Many people are working from home but without the protections normally expected in an enterprise environment. Home workers find themselves dependent on the security features and services provided by the vendors of the technology they are using. But are these adequate?
{"title":"Assessing cyber security consumer support from technology retailers","authors":"Biar Koshnaw, S. Furnell","doi":"10.12968/s1361-3723(22)70560-x","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70560-x","url":null,"abstract":"The pandemic has significantly changed the way we work, and many organisations were not prepared for that shift. Many people are working from home but without the protections normally expected in an enterprise environment. Home workers find themselves dependent on the security features and services provided by the vendors of the technology they are using. But are these adequate?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72706513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-01DOI: 10.12968/s1361-3723(22)70564-7
G. Hunter
Hiring is always changing, and tech needs and organisations are evolving at lightning speed. The competencies your organisation sought from IT hires in 2017 will probably mean very little now, and the way you spec'd cyber security job roles in 2020 will most likely not be the same in 2022. There's currently a big gap between the number of open job roles and the number of people qualified and applying to fill them.
{"title":"How tech hiring is changing","authors":"G. Hunter","doi":"10.12968/s1361-3723(22)70564-7","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70564-7","url":null,"abstract":"Hiring is always changing, and tech needs and organisations are evolving at lightning speed. The competencies your organisation sought from IT hires in 2017 will probably mean very little now, and the way you spec'd cyber security job roles in 2020 will most likely not be the same in 2022. There's currently a big gap between the number of open job roles and the number of people qualified and applying to fill them.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"454 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76973446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-01DOI: 10.12968/s1361-3723(22)70562-3
Mundeep Nayyar
{"title":"Is the GDPR a ticking time bomb for companies?","authors":"Mundeep Nayyar","doi":"10.12968/s1361-3723(22)70562-3","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70562-3","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79086963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-01DOI: 10.12968/s1361-3723(22)70021-8
Alice Short, Roland Carandang
Chief information security officers (CISOs) have evolved from technical experts to become business leaders in their own right. They are building relationships and developing strong marketing and communication skills to influence others, and their storytelling is also bringing them closer to the board at a time when cyber security needs to be clearly and simply understood. As a result, CISOs are working differently with their teams, inviting them to look at the bigger picture and consider the real-world impact of projects, and acting as stewards, advisers, mentors and coaches.
{"title":"The modern CISO: where marketing meets security","authors":"Alice Short, Roland Carandang","doi":"10.12968/s1361-3723(22)70021-8","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70021-8","url":null,"abstract":"Chief information security officers (CISOs) have evolved from technical experts to become business leaders in their own right. They are building relationships and developing strong marketing and communication skills to influence others, and their storytelling is also bringing them closer to the board at a time when cyber security needs to be clearly and simply understood. As a result, CISOs are working differently with their teams, inviting them to look at the bigger picture and consider the real-world impact of projects, and acting as stewards, advisers, mentors and coaches.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84555504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-01DOI: 10.12968/s1361-3723(22)70012-7
Gal Ringel
Even in a world with the General Data Protection Regulation (GDPR), we still leave behind a notable digital footprint online – and cyber criminals only need to follow the trail to steal customer data. Scams are already increasingly prevalent throughout the pandemic, retailers continue to fall victim to data breaches and exploits, and the issue always reaches a fever pitch during the holiday shopping season. 1 , 2 Are businesses properly equipped to keep customers’ data and their brand reputation safe?
{"title":"Preparing for data reclaim requests from online shopping","authors":"Gal Ringel","doi":"10.12968/s1361-3723(22)70012-7","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70012-7","url":null,"abstract":"Even in a world with the General Data Protection Regulation (GDPR), we still leave behind a notable digital footprint online – and cyber criminals only need to follow the trail to steal customer data. Scams are already increasingly prevalent throughout the pandemic, retailers continue to fall victim to data breaches and exploits, and the issue always reaches a fever pitch during the holiday shopping season. 1 , 2 Are businesses properly equipped to keep customers’ data and their brand reputation safe?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"35 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75251541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-01DOI: 10.12968/s1361-3723(22)70016-4
M. Queenan
Recent years have seen a significant growth in the importance attached to data governance – a vital but often inexact set of investments, methodologies and tools used by organisations to manage and exploit their data assets and stay compliant. Data governance strategies are motivated by a range of factors, from a specific focus on compliance and regulation to approaches that prioritise transformational business impact. However, many organisations struggle to exercise the appropriate levels of control over their datasets, let alone derive the potential that exists within them to improve processes and performance.
{"title":"The emergence of data governance as a service","authors":"M. Queenan","doi":"10.12968/s1361-3723(22)70016-4","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70016-4","url":null,"abstract":"Recent years have seen a significant growth in the importance attached to data governance – a vital but often inexact set of investments, methodologies and tools used by organisations to manage and exploit their data assets and stay compliant. Data governance strategies are motivated by a range of factors, from a specific focus on compliance and regulation to approaches that prioritise transformational business impact. However, many organisations struggle to exercise the appropriate levels of control over their datasets, let alone derive the potential that exists within them to improve processes and performance.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"74 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86343232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-01DOI: 10.12968/s1361-3723(22)70013-9
Jacob Ewers
Software has become an indispensable component of our everyday lives, enabling the technologies we use to be smarter and more efficient than ever before. From automating food packaging and regulating electrical grids to facilitating online banking and allowing us to connect with loved ones, software spans across all industries, helping us solve challenges both big and small. However, this comes at a price – an ever-growing attack surface.
{"title":"Building successful software security initiatives","authors":"Jacob Ewers","doi":"10.12968/s1361-3723(22)70013-9","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70013-9","url":null,"abstract":"Software has become an indispensable component of our everyday lives, enabling the technologies we use to be smarter and more efficient than ever before. From automating food packaging and regulating electrical grids to facilitating online banking and allowing us to connect with loved ones, software spans across all industries, helping us solve challenges both big and small. However, this comes at a price – an ever-growing attack surface.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86672199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}