Pub Date : 2024-01-01DOI: 10.12968/s1353-4858(24)70002-6
Steve Mansfield-Devine
Cyber security isn't getting any easier. Both the threats and the solutions designed to combat them are becoming ever more complex. Smaller firms frequently struggle to keep up with the latest threats and bring the right skills to bear. And even the largest firms face challenges when it comes to assessing risks and implementing the solutions to tackle them.
{"title":"Meeting the challenges of cyber security","authors":"Steve Mansfield-Devine","doi":"10.12968/s1353-4858(24)70002-6","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70002-6","url":null,"abstract":"Cyber security isn't getting any easier. Both the threats and the solutions designed to combat them are becoming ever more complex. Smaller firms frequently struggle to keep up with the latest threats and bring the right skills to bear. And even the largest firms face challenges when it comes to assessing risks and implementing the solutions to tackle them.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"254 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140521610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-01DOI: 10.12968/s1353-4858(23)70052-4
Paul Baird
Cyber insurance will help you deal with the costs of recovering from a breach. But it can also play a deeper role. Insurance companies now demand that organisations demonstrate their security preparedness, and this means having a detailed and accurate picture of your infrastructure and IT estate. The tools you use to obtain this picture can also give you the insight you need to improve your readiness.
网络保险将帮助您处理从漏洞中恢复的成本。但它还能发挥更深层次的作用。保险公司现在要求企业展示其安全准备情况,这就意味着要详细、准确地了解企业的基础设施和 IT 产业。您用来获取这一信息的工具也可以为您提供改进准备工作所需的洞察力。
{"title":"Improving risk management – combining security and cyber insurance practices","authors":"Paul Baird","doi":"10.12968/s1353-4858(23)70052-4","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70052-4","url":null,"abstract":"Cyber insurance will help you deal with the costs of recovering from a breach. But it can also play a deeper role. Insurance companies now demand that organisations demonstrate their security preparedness, and this means having a detailed and accurate picture of your infrastructure and IT estate. The tools you use to obtain this picture can also give you the insight you need to improve your readiness.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139292541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-01DOI: 10.12968/s1353-4858(23)70053-6
Graham Hosking
It's impossible to escape CHatGPT and other large language model AIs that are promising to disrupt everything from homework to hacking. Generative AI has a lot to offer organisations looking to find efficiencies in their business processes. But it has to be approached intelligently and with a full understanding of the potential security pitfalls, not least to your data security.
{"title":"How to assess the impact of generative artificial intelligence","authors":"Graham Hosking","doi":"10.12968/s1353-4858(23)70053-6","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70053-6","url":null,"abstract":"It's impossible to escape CHatGPT and other large language model AIs that are promising to disrupt everything from homework to hacking. Generative AI has a lot to offer organisations looking to find efficiencies in their business processes. But it has to be approached intelligently and with a full understanding of the potential security pitfalls, not least to your data security.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139305338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-01DOI: 10.12968/s1353-4858(23)70054-8
Mark Jow
Monitoring for and detecting malicious activity on your networks is being made harder by the increasing volume of encrypted traffic. This encryption exists for good reasons, particularly when cloud services are in play, but threat actors are exploiting its inscrutability to gain access to networks and loiter for extended periods. However, extended Berkeley Packet Filter (eBPF) network analysis technology offers the possibility to gain full visibility into encrypted traffic across VM or container workloads.
{"title":"Encryption blind spots: shining a light on cloud network traffic","authors":"Mark Jow","doi":"10.12968/s1353-4858(23)70054-8","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70054-8","url":null,"abstract":"Monitoring for and detecting malicious activity on your networks is being made harder by the increasing volume of encrypted traffic. This encryption exists for good reasons, particularly when cloud services are in play, but threat actors are exploiting its inscrutability to gain access to networks and loiter for extended periods. However, extended Berkeley Packet Filter (eBPF) network analysis technology offers the possibility to gain full visibility into encrypted traffic across VM or container workloads.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139304953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-01DOI: 10.12968/s1353-4858(23)70055-x
Steve Kenny
The recently adopted NIS 2 Directive (NIS 2) directive and its UK counterpart will compel organisations in Europe that are involved with essential services to meet stringent requirements for security. But it's not only the companies themselves that need to ensure they understand and can meet these requirements: security firms that provide services to these kinds of customers also need to be on top of the regulations.
{"title":"The NIS 2 Directive: securing critical assets","authors":"Steve Kenny","doi":"10.12968/s1353-4858(23)70055-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70055-x","url":null,"abstract":"The recently adopted NIS 2 Directive (NIS 2) directive and its UK counterpart will compel organisations in Europe that are involved with essential services to meet stringent requirements for security. But it's not only the companies themselves that need to ensure they understand and can meet these requirements: security firms that provide services to these kinds of customers also need to be on top of the regulations.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139303193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}