Pub Date : 2023-08-01DOI: 10.12968/s1361-3723(23)70038-9
Corey Nachreiners
It's time we moved on from the traditional focus on technical and operational controls that IT teams need to deploy to defend against attack, and adopt a proper cyber security governance programme.
{"title":"Good cyber security governance is crucial for us all","authors":"Corey Nachreiners","doi":"10.12968/s1361-3723(23)70038-9","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70038-9","url":null,"abstract":"It's time we moved on from the traditional focus on technical and operational controls that IT teams need to deploy to defend against attack, and adopt a proper cyber security governance programme.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"58 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82749628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-01DOI: 10.12968/s1361-3723(23)70036-5
G. Golan
As we shift further and further into the digital realm, the threats that face us are outpacing even the most aggressive digital transformation efforts. For businesses, tackling security is no longer a matter of making IT systems more robust – it is about the safety of the entire organisation.
{"title":"A new age of cyber: transitioning from security to safety","authors":"G. Golan","doi":"10.12968/s1361-3723(23)70036-5","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70036-5","url":null,"abstract":"As we shift further and further into the digital realm, the threats that face us are outpacing even the most aggressive digital transformation efforts. For businesses, tackling security is no longer a matter of making IT systems more robust – it is about the safety of the entire organisation.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82203476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-01DOI: 10.12968/s1361-3723(23)70035-3
Christine Bejerasco
It's easy to blame people when security incidents occur. But while many types of breaches do indeed involve a human element, we should stop to ask ourselves why people acted in the ways they did, and why that was allowed to become a problem. Our systems and processes need to be designed with security embedded deeply within them so that minor lapses on the part of staff members are prevented from becoming a problem.
{"title":"Don't blame people – fix the system","authors":"Christine Bejerasco","doi":"10.12968/s1361-3723(23)70035-3","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70035-3","url":null,"abstract":"It's easy to blame people when security incidents occur. But while many types of breaches do indeed involve a human element, we should stop to ask ourselves why people acted in the ways they did, and why that was allowed to become a problem. Our systems and processes need to be designed with security embedded deeply within them so that minor lapses on the part of staff members are prevented from becoming a problem.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"66 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80216925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-01DOI: 10.12968/s1361-3723(23)70037-7
D. Morgan
The European Union's Digital Operational Resilience Act (DORA) tackles what is currently seen as a weak element in the financial sector – third-party tech suppliers. But does it affect you? And if so, how should you respond?
{"title":"Coming to terms with DORA","authors":"D. Morgan","doi":"10.12968/s1361-3723(23)70037-7","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70037-7","url":null,"abstract":"The European Union's Digital Operational Resilience Act (DORA) tackles what is currently seen as a weak element in the financial sector – third-party tech suppliers. But does it affect you? And if so, how should you respond?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"91 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81251050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-01DOI: 10.12968/s1361-3723(23)70040-7
Samudhra Sendhil
Cyber criminals have not been slow to see the benefits of artificial intelligence. They have adopted generative AI as a means to improve their credibility and success rate in social engineering attacks. So how do you detect this abuse of AI, and what do you do about it?
{"title":"They walk among us: AI-based social engineering attacks","authors":"Samudhra Sendhil","doi":"10.12968/s1361-3723(23)70040-7","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70040-7","url":null,"abstract":"Cyber criminals have not been slow to see the benefits of artificial intelligence. They have adopted generative AI as a means to improve their credibility and success rate in social engineering attacks. So how do you detect this abuse of AI, and what do you do about it?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"108 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83441654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-01DOI: 10.12968/s1361-3723(23)70030-4
Shari Gardner
For many organisations, cyber insurance is a tricky subject. The cost can be a disincentive, the process of insuring can be complex and it seems there is an increasing list of circumstances under which insurers will not pay out. But given the threats that all organisations face, can you really risk not being insured?
{"title":"Why cyber insurance has an image problem","authors":"Shari Gardner","doi":"10.12968/s1361-3723(23)70030-4","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70030-4","url":null,"abstract":"For many organisations, cyber insurance is a tricky subject. The cost can be a disincentive, the process of insuring can be complex and it seems there is an increasing list of circumstances under which insurers will not pay out. But given the threats that all organisations face, can you really risk not being insured?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"12 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72484146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-01DOI: 10.12968/s1361-3723(23)70031-6
Jacques de la Rivière
Artificial intelligence is creeping into everything, including network detection and response (NDR). But is faith in the new technology blinding us to some serious deficiencies and possible vulnerabilities?
{"title":"A single point of failure? AI and network detection and response","authors":"Jacques de la Rivière","doi":"10.12968/s1361-3723(23)70031-6","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70031-6","url":null,"abstract":"Artificial intelligence is creeping into everything, including network detection and response (NDR). But is faith in the new technology blinding us to some serious deficiencies and possible vulnerabilities?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74915463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-01DOI: 10.12968/s1361-3723(23)70033-x
C. Scott
The workplace has gone through a forced and dramatic change. Remote and hybrid working have been normalised, putting a huge strain on the technology infrastructures that support them and rendering many of our traditional cyber defences obsolete. Of all the threats that face today's workforce, social engineering is arguably the most pernicious and difficult to mitigate.
{"title":"Social engineering the dispersed workforce","authors":"C. Scott","doi":"10.12968/s1361-3723(23)70033-x","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70033-x","url":null,"abstract":"The workplace has gone through a forced and dramatic change. Remote and hybrid working have been normalised, putting a huge strain on the technology infrastructures that support them and rendering many of our traditional cyber defences obsolete. Of all the threats that face today's workforce, social engineering is arguably the most pernicious and difficult to mitigate.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"44 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86482503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}