Contact information of Henry Stewart Publications
Corrections
All material on this site has been provided by the respective publishers and authors. You can help
correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:aza:csj000. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Henry Stewart Talks (email available below). General contact details of provider: .
Content
October 2024, Volume 8, Issue 2
- 100-101 Editorial
by Beckett, Simon
- 102-109 Three approaches to foster organisational cohesion and reduce friction for cyber and security teams
by Wanic, Elizabeth & Smith, Bradley
- 110-130 From compliance to impact: Tracing the transformation of an organisational security awareness programme
by Haney, Julie & Lutters, Wayne
- 131-149 How to mitigate ransomware risk through data and risk quantification
by Andersen, Erik Sørup
- 150-159 Crumbling bridges: The failed economics of software maintenance
by Herz, JC
- 160-168 Why crisis leadership competencies matter in the effective management of a cyber crisis
by Sapriel, Caroline
- 169-176 Guidelines for non-profit organisation governance in cyber resilience
by Johnson, Margaret Mavins
- 177-188 Your decision: Senior professionals’ decision making during a simulated ransomware attack
by Muhly, Fabian & Leo, Philipp
September 2024, Volume 8, Issue 1
June 2024, Volume 7, Issue 4
March 2024, Volume 7, Issue 3
- 197-198 Editorial
by Beckett, Simon
- 199-206 Consequence is not enough: The role of cyber intelligence in improving cyberattack estimates
by Freeman, Sarah & Bristow, Mark
- 207-216 Purple Teaming: A comprehensive and collaborative approach to cyber security
by Van Buggenhout, Erik
- 217-228 Improving likelihood calculation by mapping MITRE ATT&CK to existing controls
by Beuchelt, Gerald & Agrawal, Sonal
- 229-236 The EU Cybersecurity Skills Academy : A silver bullet to address the cyber security skills gap in the European Union?
by Spanou, Despina
- 237-252 Issues to consider relating to information governance and artificial intelligence
by Brett, Mark
- 253-261 How can national policies support the development and implementation of coordinated vulnerability disclosure?
by Vander Geeten, Valéry
- 262-272 Online Potemkin villages: Discovering a Russian influence operation on social media
by Bailey, Patricia
- 273-278 Caught in the web: Pitfalls of electronic communications
by Yerzak, E. J.
December 2023, Volume 7, Issue 2
- 100-101 Editorial
by Beckett, Simon
- 102-109 How processes affect IT-systems and business complexity, and what correlations are present
by Boldevin, Reidar J.
- 110-119 Reducing complexity in cyber security architecture: A practical model for security classifications
by Richter, Eleni
- 120-144 How to get your board and executive team cyber-ready and achieve a culture of cyber security from the board down: The CEO Method™ for breach prevention
by Cetnarski, Andrzej
- 145-153 The post-breach threat landscape and the need for an ‘effective’ compliance programme
by Warshawsky, Brian Mitchell
- 154-162 Cyber security culture as a strategic asset
by Schmitz, Glendon
- 163-171 A case for public support for vulnerability disclosure policies
by Bordone, Francesco
- 172-180 Why policy-based authorisation is critical for identity-first security
by Helemski, Gal
- 181-187 The vital importance of a successful threat intelligence programme
by Corem, Yochai
September 2023, Volume 7, Issue 1
- 4-5 Editorial
by Beckett, Simon
- 6-15 Beyond detection: Uncovering unknown threats
by Chen, George
- 16-23 Legacy apps to cloud: A risk-based approach
by Sharma, Naresh
- 24-32 Exploring the practicalities and quality of pentesting at scale : Globally, pentest coverage is increasing but remains insufficient
by Wong, Caroline
- 33-43 CIO and CISO collaboration for a shared vision that enables a cyber-resilient future
by Van Den Heever, Nastassja
- 44-51 When push comes to shove: Managing strong personalities in a cyber incident
by Sangster, Mark
- 52-62 Approaches to cyber security in small and medium-sized enterprises: Why it needs to change
by Newman, Simon
- 63-72 From stress to success: Neuroscience-informed training for cyber security first responders
by Barkes, Carol & Jones, Colby
- 73-81 Cryptography works, but needs a system-wide view
by Martin, Keith
- 82-92 European cyber security law in 2023: A review of the advances in the Network and Information Security 2 Directive 2022/2555
by Singh, Charanjit
July 2023, Volume 6, Issue 4
- 292-293 Editorial
by Beckett, Simon
- 294-300 How CISOs can truly align with the business
by Alexander, Candy
- 301-310 Machine learning or behaviour heuristics? The synergy of approaches to defeat advanced ransomware threats
by Strogov, Vladimir & Ulasen, Sergey
- 311-319 The curse of knowledge can damage awareness programmes: Here's how to defeat it
by Tomlinson, Kerry
- 320-333 Privacy threats and vulnerabilities: Reinvent your privacy engineering practices and win
by Sriharsha, Smitha
- 334-355 Analysis of software bill of materials tools
by Arora, Arushi & Garman, Christina
- 356-365 The human side of cybercrime
by Watson, Kylie & Payne, Tayla
- 366-372 A strong story to tell: Top ten mistakes by administrators
by Januszkiewicz, Paula
- 373-383 An approach to establishing a multi-organisational public sector security operations centre
by Brett, Mark
March 2023, Volume 6, Issue 3
- 196-197 Editorial
by Beckett, Simon
- 198-210 Building a high-performing data ethics programme from the ground up
by Ross, Alexandra & Golbin, Ilana & Cohen, Bret S.
- 211-219 Dangers of succumbing to bias in cyber security : An evaluation of the impact of cognitive biases on threat assessments and cyber security strategies
by Darley, Hanah-Marie
- 220-229 The Zoom effect: A framework for security programme transformation
by Ceylan, Heather & Chavan, Ariel
- 230-241 Users are not stupid: Six cyber security pitfalls overturned
by Haney, Julie
- 242-260 Improving your Active Directory security posture: AdminSDHolder to the rescue
by Grillenmeier, Guido
- 261-274 The psychology of social engineering
by Coatesworth, Barry
- 275-284 OTP bots and crypto: A tactic to disrupt
by Spaeth, Kristen
December 2022, Volume 6, Issue 2
- 100-101 Editorial
by Beckett, Simon
- 102-110 Social engineering and the use of persuasion to commit cyber fraud
by Wantenaar, Lance
- 111-118 Threat intelligence meets risk management for operational resilience
by Walsh, Teresa T.
- 119-131 Think beyond IT security — cyber resilience to build future-ready world : OT and ICS, critical infrastructure and beyond
by Makadia, Sanam
- 132-140 The how and why of cyber security policy : Create behavioural and technical rules to mitigate risk
by Lewis, Jael & Turbyfill, Cara E.
- 141-147 Browser isolation as an enterprise security control
by Harrison, Henry
- 148-153 Why deep learning holds the key to preventing cyberattacks before they can strike
by Crowley, Karen
- 154-167 Exploring phronesis in cyber security, management and resilience
by Brett, Mark
- 168-177 Mitigating challenges in an evolving cyber threat landscape
by Ang, Benjamin
- 178-187 Malware development threats with modern technologies
by Amer, Lawrence
September 2022, Volume 6, Issue 1
- 4-5 Editorial
by Beckett, Simon
- 6-13 Securing decentralised organisations
by Rajnović, Damir
- 14-25 Anomaly-based threat detection: Behavioural fingerprinting versus self-learning AI
by Cornelius, Jeff & Fellows, Simon & Cox, Oakley & Lister, Sam
- 26-33 A security concept for a global factory network : Practical considerations in implementation
by Voeth, Michael & Patterson, Clare & Stemmann, Jannis
- 34-40 The insider threat to financial services: Why a shift in mindset is required to combat this silent risk
by Harvey, Dave
- 41-51 Active Directory security: Why we fail and what auditors miss
by Cortes, Sylvain
- 52-61 Integration versus convergence: A battle of the buzzwords?
by Ramezanian, Rodman
- 62-78 The PIVO process for identifying vulnerabilities impact for organisation risks: An automated solution
by Simoni, Jean-Luc & Ulliac, Alexis & Massip, Thomas & Devaux, Thomas
- 79-89 Financial services security risks and remediations
by Arbel, Lior
- 90-91 `Cybercrime through social engineering: The new global crisis` by Chris Kayser
by Wantenaar, Lance
June 2022, Volume 5, Issue 4
- 284-285 Editorial
by Beckett, Simon
- 286-293 The new offensive cyber security: Strategically using asymmetrical tactics to promote information security
by Ott, Christopher
- 294-302 How to stop attackers from owning your Active Directory
by Crandall, Carolyn & Cole, Tony
- 303-315 The imperative of enterprise-grade security for 5G
by Burakovsky, Leonid & Kriz, Danielle
- 316-323 How a well-thought-out incident response can take the advantage back from attackers
by Christiansen, James
- 324-334 Focusing on the primary purpose: Protecting the attorney–client privilege and work product doctrine in incident response
by Taylor, Ashley & Raether, Ron & Mirza, Sadia & Hatcher, Sam & Gill, Bonnie
- 335-349 A modern approach to cyber threat protection: The holy grail of cyber security departments?
by Trocyszyn, Dariusz & Korczyński, Adrian
- 350-360 Eliminating the blind spots: How to be accountable for an organisation’s overall security
by Dryland, Lorraine
- 361-377 A principles-led approach to information assurance and governance in local government
by Brett, Mark
March 2022, Volume 5, Issue 3
- 188-189 Editorial
by Beckett, Simon
- 190-205 Tackling cybercrime and ransomware head-on: Disrupting criminal networks and protecting organisations
by Laitinen, Marja & Armstrong-Smith, Sarah
- 206-215 Paradigm of cyber security transformation in Lithuanian Railways during a pandemic
by Kedys, Antanas & Navickienė, Žaneta & Šlepetys, Rolandas
- 216-226 Application security automation in development
by Kennedy, Mike & Perkins, Chris & Brown, Maria & Prins, Kori
- 227-236 Achieving least privilege at cloud scale with cloud infrastructure entitlements management
by Neelakandhan, Maya & Ramprakash, Guruprasad & Gaidhani, Mrudula
- 237-250 Enabling cyber incident collaboration in UK local government through fast-time communication
by Brett, Mark
- 251-276 How national CSIRTs leverage public data, OSINT and free tools in operational practices: An empirical study
by Kassim, Sharifah Roziah Binti Mohd & Li, Shujun & Arief, Budi
December 2021, Volume 5, Issue 2
- 100-101 Editorial
by Beckett, Simon
- 102-112 Digital contact tracing: Privacy versus efficiency
by Ilves, Ieva
- 113-125 Improving threat detection with a detection development life cycle
by Barros, Augusto
- 126-134 Maturing operational security with an automation-first approach to IAM
by Christ, Bryan
- 135-141 Optimising cyber threat intelligence for your organisation
by Girtz, Christina
- 142-154 Cyber security and data protection: Learning from your own mistakes is good, learning from somebody else’s mistakes is better — the reasons underpinning fines and what regulators expect of cyber security
by Craddock, Peter & Bogget, Eline Van
- 155-163 The high-performing low-risk mainframe: Reassess security in the context of changing operations to extinguish risk before it bursts out of control
by Furno, Mary Ann
- 164-176 Security and safety incidents and standards
by Kemp, Robert & Smith, Richard
September 2021, Volume 5, Issue 1
- 4-5 Call for papers
by Beckett, Simon
- 6-12 The human variable: Designing a security strategy for a future in flux
by Sorrentino, Gary
- 13-26 Staying one step ahead of your adversaries: How to build a cyber threat intelligence team capable of delivering business value
by Nicholson, Keith
- 27-36 Discovering CovidLock
by Anderson, Chad & Saleh, Tarik & Mcnee, Sean M.
- 37-50 Scaling cyber physical systems throughout the organisation
by Leipnik, Matt
- 51-65 Is ransomware winning?
by Goettl, Chris
- 66-79 Home-grown machine learning implementation for a SIRT: A use case — detecting domain-generating algorithms
by Lodge, Brennan
- 80-94 Zero trust computing through the application of information asset registers
by Brett, Mark
June 2021, Volume 4, Issue 4
- 300-301 Editorial
by Beckett, Simon
- 302-316 A framework for quantifying cyber security risks
by Wolthuis, Reinder & Phillipson, Frank & Jongsma, Hidde-Jan & Langenkamp, Peter
- 317-329 Open sesame: Lessons in password-based user authentication
by Rashidi, Bahman & Garg, Vaibhav
- 330-344 An overview of current issues and practice relating to local government cyber security in England and Wales
by Brett, Mark
- 345-367 Cyber security for microreactors in advanced energy systems
by Sabharwall, Piyush & Gibb, James & Ritter, Christopher & Araújo, Kathleen & Gupta, Abhinav & Ferguson, Ian & Rolston, Bri & Fisher, Ron & Gehin, Jess & Ballout, Youssef
- 368-379 The laws governing data breaches: An update
by Dayanim, Behnam & Butler, Roya
- 380-387 Managing stakeholder communication during a cyber crisis
by Sapriel, Caroline
March 2021, Volume 4, Issue 3
- 200-201 Editorial
by Beckett, Simon
- 202-212 Risk is a result of human behaviour: Leveraging behavioural analytics to strengthen internal controls
by Mehta, Arvind
- 213-222 Insider threat programmes: Time to hit restart
by Hanson, Jadee & Thorsen, Todd & Hunstad, Nathan
- 223-231 The human problem behind credential theft and reuse
by Kron, Erich
- 232-242 Know your suppliers: A review of ICT supply chain risk management efforts by the US government and its agencies
by Osunji, Olatunji
- 243-250 International principles for boards of directors and cyber security
by Clinton, Larry
- 251-266 Cyber security for smart cities: End-to-end cyber security strategy for IoT connected services
by Cissé, Moh
- 267-291 Identifying cyber security risks in Spanish airports
by Florido-Benítez, Lázaro
December 2020, Volume 4, Issue 2
- 100-101 Editorial
by Beckett, Simon
- 102-110 The industrial Internet of Things: From preventive to reactive systems — redefining your cyber security game plan for the changing world
by Kipling, Lesley
- 111-121 The complexity of performing cyber audits in the space sector along the supply chain
by Fernandez, Jose Ramon Coz & Pastor Pérez, Vicente José
- 122-134 Cheetahs, COVID-19 and the demand for crypto-agility
by Thelander, Michael
- 135-144 Cyber leadership across a business ecosystem
by Doan, Matthew
- 145-159 A framework for fostering a dynamic information security culture
by Carver, Renay
- 160-181 Vulnerabilities on the wire: Mitigations for insecure ICS device communication
by Hoffman, Michael
- 182-193 The landscape from above: Continuous cloud monitoring for continuous assurance
by Khalil, Fouad
September 2020, Volume 4, Issue 1
- 4-5 Editorial
by Beckett, Simon
- 6-13 Taking risk to the edge of acceptable
by Williamson, Steve
- 14-28 Consider the consequences: Understanding and limiting physical impacts caused by an ICS cyberattack
by Wyman, Richard
- 29-39 Effectively integrating physical security technology into the operational technology domain
by Wharton, Matthew
- 40-47 Users are an intelligence source: Are you leveraging them in your detection strategy?
by Dudley, Tonia
- 48-57 Think like a hacker: Reducing cyber security risk by improving API design and protection
by Giese, Gerhard
- 58-69 The challenge of assessing strategic cyber security risk in organisations and critical infrastructure
by Harry, Charles
- 70-76 What the market is not telling you about the cyber security skills shortage
by Reffold, Karla
- 77-90 Non-traditional cyber adversaries: Combatting human trafficking through data science
by Borrelli, Danielle & Caltagirone, Sherrie
June 2020, Volume 3, Issue 4
- 292-293 Editorial
by Beckett, Simon
- 294-307 Moving target defence: Economics and asymmetry
by Maclean, Don
- 308-314 1-10-60: Measuring the speed of incident response
by Pool, Ronald
- 315-329 What lawyers mean by ‘reasonable’ cyber security controls
by Cronin, Chris
- 330-338 The three Ps of third-party risk
by Sangster, Mark
- 339-350 Cyber incident response approach framework for local government
by Brett, Mark & Wood, Joshua & Parker, Jamie
- 351-362 Hacking humans: A case study and analysis of vulnerabilities in the advancing medical device landscape
by Hempel, Gabrielle & Janosek, Diane Brady & Raziano, Donna Brady
- 363-378 The role of information about opponent’s actions and intrusion-detection alerts on cyber decisions in cyber security games
by Aggarwal, Palvi & Dutt, Varun
March 2020, Volume 3, Issue 3
- 193-194 Editorial
by Beckett, Simon
- 195-207 Security and privacy risks in the blockchain ecosystem
by Bartoletti, Ivana & Plantié, Samuel & Sambodaran, Arun
- 208-219 IT modernisation in the energy sector: Preventing cyberthreats to critical infrastructure
by Isom, Pamela K.
- 220-232 The European Commission goes ‘cloud first’: A roadmap towards trusted cloud adoption to seize the opportunities of digital transformation for EU institutions and agencies
by Ducatel, Ken & Michlmayr, Thomas & Merle, Philippe & Baskovc, Dalibor & Mestre, François
- 233-255 ADDRR: A counter kill chain cyber security model
by Henneberg, Alex
- 256-264 Zero trust in an all too trusting world
by Caron, Gerald
- 265-274 Security monitoring strategies for your OT infrastructure
by Jbair, Mohammad
- 275-286 Evaluating cyber risk reporting in US financial reports
by Fisher, Ron & Wood, Justin & Porod, Celia & Greco, Lydia
December 2019, Volume 3, Issue 2
- 100-102 Call to arms: A holistic security approach for a changing threat landscape
by Grassie, Richard P.
- 103-115 Third-party risk management: Strategy to mitigate ‘on-premise’ and ‘cloud’ cyber security risks
by Cissé, Moh
- 116-123 Digital twins, the industrial Internet of Things and cyber security threats in connected industry
by Hearn, Mark
- 124-133 A strategic approach to cyber security risk reduction for FX in the cloud using people, processes and technology
by Lee-Browne, Rupert
- 134-144 Managing the hypercomplexity of cyber security regulation: In search of a regulatory Rosetta Stone
by Paul Greene, F.
- 145-158 Healthcare cyber security and HIPAA assurance with business associates
by Ahlstrom, Janice & Tait, Christopher & Zoline, Kenneth
- 159-174 Preventing cybercrime: A framework for understanding the role of human vulnerabilities
by Kayser, Christopher S. & Ellen Mastrorilli, Mary & Cadigan, Robert
- 175-185 The nature of society: Are certain cultures less predisposed to cyberthreats than others? An examination using the example of Germany
by Werne, Jochen
September 2019, Volume 3, Issue 1
- 4-5 Call for papers
by Beckett, Simon
- 6-13 Impersonation fraud scenarios: How to protect, detect and respond
by Bruno, Mario
- 14-24 Doing risk management correctly
by Frietzsche, Randall
- 25-36 Examining the relationship between formal RMF training and perceptions of RMF effectiveness, sustainability and commitment in RMF practitioners
by Schall, Philip D. & Oni, Oludotun
- 37-43 Surviving ransom driven DDoS extortion campaigns
by Newman, Sean
- 44-56 Resilience to combined attacks
by Winks, David
- 57-72 A data privacy approach for cyber-physical systems
by Weldert, Jan & Von Wedel, Jana Karina & Beul, Christian
- 73-92 Cyber security and human resource development implications for the enterprise
by Gillam, Andrew R.
June 2019, Volume 2, Issue 4
- 292-293 Editorial
by Beckett, Simon
- 294-302 The Eurosystem’s cyber resilience strategy for financial market infrastructures
by Bayle De Jessé, Marc
- 303-309 Why do cyber security programmes fail?
by Moschovitis, Chris
- 310-320 Cyber risk: Leveraging a multidisciplinary approach
by Branfield, Charlotte
- 321-335 Thwarting a cyber physical attack in the Internet of Things era
by Mistry, Bharat & Malik, William (Bill)
- 336-345 Leadership in the cyber warfare era: Formulating a data breach reporting and management strategy
by Chimuka, Garikai
- 346-359 An ISO 27001 compliance project for a cyber security service team
by Cissé, Moh
- 360-386 Civil liberties vs national security in the encryption debate: Exceptional access and the trust deficit
by Bieber, Brittany & Sultan, Ahmad & Nacht, Michael & Rashid Diya, Sabhanaz
December 2018, Volume 2, Issue 3
- 200-201 Editorial
by Beckett, Simon
- 202-210 Framing cyber security as a business risk
by Wheeler, Evan
- 211-218 Insider threat detection: Where and how data science applies
by Lin, Derek
- 219-227 DevOps security improvements through effective use of container technology
by Goldschmidt, Murray
- 228-237 How can we effectively regulate grid security?
by Alrich, Tom
- 238-250 Strategic trends in the global cyber conflict
by Baram, Gil & Cohen, Daniel & Shapira, Zeev & Wechsler, Omree & Hight, Nir & Ben-Israel, Isaac
- 251-261 SOC 2030: Security Operations centres are broken, let’s fix them
by Matre, Kerry