Contact information of Henry Stewart Publications
Serial Information
Download restrictions: Requires a paid subscription for full access.
Description: Cyber Security is the major peer-reviewed journal publishing in-depth articles and case studies written by and for cyber security professionals. It showcases the latest thinking and best practices in cyber security, cyber resilience, cyber crime and cyber warfare, drawing on practical experience in national critical infrastructure, government, corporate, finance, military and not-for-profit sectors. Subjects covered include: cyber security risk assessments; cyber response programmes; protective measures; threat surface analysis and detection; training ‘red’ teams; crisis and reputation management; data breaches; awareness, education and training; workforce analysis; cyber security in the supply chain; insider threats; cloud security risk; cyber warfare, cyber terrorism and state-sponsored attacks; safe disposal of data; cyber security investigations and digital/analogue forensics; hackers’ techniques and motivations; security architectures and network assurance; internet fraud techniques; encryption, cryptology and data protection; user behaviour analytics.
Series handle: RePEc:aza:csj000
Citations RSS feed: at CitEc
Impact factors
Access and download statisticsTop item:
Corrections
All material on this site has been provided by the respective publishers and authors. You can help
correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:aza:csj000. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Henry Stewart Talks (email available below). General contact details of provider: .
Content
February 2025, Volume 8, Issue 3
- 196-197 Editorial
by Beckett, Simon
- 198-213 AI in cyber security: A dual perspective on hacker tactics and defensive strategies
by Amer, Lawrence
- 214-221 Applying forensic engineering to cyber security incidents
by Jordaan, Jason
- 222-231 Preparing for the implementation of reporting requirements from new EU and UK product and cyber security legislation
by Rajnović, Gaus
- 232-242 How to secure development environments
by Giese, Gerd & Bartel, Frank
- 243-254 Data minimisation: A crucial pillar of cyber security
by Luehr, Paul & Reilly, Brandon
- 255-263 Seeking harmony: CISA’s proposed cyber reporting rules for critical infrastructure are an ambitious work in progress
by Folio Iii, Joseph C. & Ross, Alexandra & Wolfe, Ian & Weigel, Nicholas A.
- 264-272 Cyber threat intelligence in practice: Implications of the blurred lines between public and private intelligence activity
by Ashdown, Neil & Martin, Keith
- 273-280 Fast-changing cyber threat landscape and a new reality of cyber security
by Kedys, Antanas
- 281-298 Differences between traditional network security and security in the cloud
by Verbitskiy, Ilya
October 2024, Volume 8, Issue 2
- 100-101 Editorial
by Beckett, Simon
- 102-109 Three approaches to foster organisational cohesion and reduce friction for cyber and security teams
by Wanic, Elizabeth & Smith, Bradley
- 110-130 From compliance to impact: Tracing the transformation of an organisational security awareness programme
by Haney, Julie & Lutters, Wayne
- 131-149 How to mitigate ransomware risk through data and risk quantification
by Andersen, Erik Sørup
- 150-159 Crumbling bridges: The failed economics of software maintenance
by Herz, JC
- 160-168 Why crisis leadership competencies matter in the effective management of a cyber crisis
by Sapriel, Caroline
- 169-176 Guidelines for non-profit organisation governance in cyber resilience
by Johnson, Margaret Mavins
- 177-188 Your decision: Senior professionals’ decision making during a simulated ransomware attack
by Muhly, Fabian & Leo, Philipp
September 2024, Volume 8, Issue 1
June 2024, Volume 7, Issue 4
March 2024, Volume 7, Issue 3
- 197-198 Editorial
by Beckett, Simon
- 199-206 Consequence is not enough: The role of cyber intelligence in improving cyberattack estimates
by Freeman, Sarah & Bristow, Mark
- 207-216 Purple Teaming: A comprehensive and collaborative approach to cyber security
by Van Buggenhout, Erik
- 217-228 Improving likelihood calculation by mapping MITRE ATT&CK to existing controls
by Beuchelt, Gerald & Agrawal, Sonal
- 229-236 The EU Cybersecurity Skills Academy : A silver bullet to address the cyber security skills gap in the European Union?
by Spanou, Despina
- 237-252 Issues to consider relating to information governance and artificial intelligence
by Brett, Mark
- 253-261 How can national policies support the development and implementation of coordinated vulnerability disclosure?
by Vander Geeten, Valéry
- 262-272 Online Potemkin villages: Discovering a Russian influence operation on social media
by Bailey, Patricia
- 273-278 Caught in the web: Pitfalls of electronic communications
by Yerzak, E. J.
December 2023, Volume 7, Issue 2
- 100-101 Editorial
by Beckett, Simon
- 102-109 How processes affect IT-systems and business complexity, and what correlations are present
by Boldevin, Reidar J.
- 110-119 Reducing complexity in cyber security architecture: A practical model for security classifications
by Richter, Eleni
- 120-144 How to get your board and executive team cyber-ready and achieve a culture of cyber security from the board down: The CEO Method™ for breach prevention
by Cetnarski, Andrzej
- 145-153 The post-breach threat landscape and the need for an ‘effective’ compliance programme
by Warshawsky, Brian Mitchell
- 154-162 Cyber security culture as a strategic asset
by Schmitz, Glendon
- 163-171 A case for public support for vulnerability disclosure policies
by Bordone, Francesco
- 172-180 Why policy-based authorisation is critical for identity-first security
by Helemski, Gal
- 181-187 The vital importance of a successful threat intelligence programme
by Corem, Yochai
September 2023, Volume 7, Issue 1
- 4-5 Editorial
by Beckett, Simon
- 6-15 Beyond detection: Uncovering unknown threats
by Chen, George
- 16-23 Legacy apps to cloud: A risk-based approach
by Sharma, Naresh
- 24-32 Exploring the practicalities and quality of pentesting at scale : Globally, pentest coverage is increasing but remains insufficient
by Wong, Caroline
- 33-43 CIO and CISO collaboration for a shared vision that enables a cyber-resilient future
by Van Den Heever, Nastassja
- 44-51 When push comes to shove: Managing strong personalities in a cyber incident
by Sangster, Mark
- 52-62 Approaches to cyber security in small and medium-sized enterprises: Why it needs to change
by Newman, Simon
- 63-72 From stress to success: Neuroscience-informed training for cyber security first responders
by Barkes, Carol & Jones, Colby
- 73-81 Cryptography works, but needs a system-wide view
by Martin, Keith
- 82-92 European cyber security law in 2023: A review of the advances in the Network and Information Security 2 Directive 2022/2555
by Singh, Charanjit
July 2023, Volume 6, Issue 4
- 292-293 Editorial
by Beckett, Simon
- 294-300 How CISOs can truly align with the business
by Alexander, Candy
- 301-310 Machine learning or behaviour heuristics? The synergy of approaches to defeat advanced ransomware threats
by Strogov, Vladimir & Ulasen, Sergey
- 311-319 The curse of knowledge can damage awareness programmes: Here's how to defeat it
by Tomlinson, Kerry
- 320-333 Privacy threats and vulnerabilities: Reinvent your privacy engineering practices and win
by Sriharsha, Smitha
- 334-355 Analysis of software bill of materials tools
by Arora, Arushi & Garman, Christina
- 356-365 The human side of cybercrime
by Watson, Kylie & Payne, Tayla
- 366-372 A strong story to tell: Top ten mistakes by administrators
by Januszkiewicz, Paula
- 373-383 An approach to establishing a multi-organisational public sector security operations centre
by Brett, Mark
March 2023, Volume 6, Issue 3
- 196-197 Editorial
by Beckett, Simon
- 198-210 Building a high-performing data ethics programme from the ground up
by Ross, Alexandra & Golbin, Ilana & Cohen, Bret S.
- 211-219 Dangers of succumbing to bias in cyber security : An evaluation of the impact of cognitive biases on threat assessments and cyber security strategies
by Darley, Hanah-Marie
- 220-229 The Zoom effect: A framework for security programme transformation
by Ceylan, Heather & Chavan, Ariel
- 230-241 Users are not stupid: Six cyber security pitfalls overturned
by Haney, Julie
- 242-260 Improving your Active Directory security posture: AdminSDHolder to the rescue
by Grillenmeier, Guido
- 261-274 The psychology of social engineering
by Coatesworth, Barry
- 275-284 OTP bots and crypto: A tactic to disrupt
by Spaeth, Kristen
December 2022, Volume 6, Issue 2
- 100-101 Editorial
by Beckett, Simon
- 102-110 Social engineering and the use of persuasion to commit cyber fraud
by Wantenaar, Lance
- 111-118 Threat intelligence meets risk management for operational resilience
by Walsh, Teresa T.
- 119-131 Think beyond IT security — cyber resilience to build future-ready world : OT and ICS, critical infrastructure and beyond
by Makadia, Sanam
- 132-140 The how and why of cyber security policy : Create behavioural and technical rules to mitigate risk
by Lewis, Jael & Turbyfill, Cara E.
- 141-147 Browser isolation as an enterprise security control
by Harrison, Henry
- 148-153 Why deep learning holds the key to preventing cyberattacks before they can strike
by Crowley, Karen
- 154-167 Exploring phronesis in cyber security, management and resilience
by Brett, Mark
- 168-177 Mitigating challenges in an evolving cyber threat landscape
by Ang, Benjamin
- 178-187 Malware development threats with modern technologies
by Amer, Lawrence
September 2022, Volume 6, Issue 1
- 4-5 Editorial
by Beckett, Simon
- 6-13 Securing decentralised organisations
by Rajnović, Damir
- 14-25 Anomaly-based threat detection: Behavioural fingerprinting versus self-learning AI
by Cornelius, Jeff & Fellows, Simon & Cox, Oakley & Lister, Sam
- 26-33 A security concept for a global factory network : Practical considerations in implementation
by Voeth, Michael & Patterson, Clare & Stemmann, Jannis
- 34-40 The insider threat to financial services: Why a shift in mindset is required to combat this silent risk
by Harvey, Dave
- 41-51 Active Directory security: Why we fail and what auditors miss
by Cortes, Sylvain
- 52-61 Integration versus convergence: A battle of the buzzwords?
by Ramezanian, Rodman
- 62-78 The PIVO process for identifying vulnerabilities impact for organisation risks: An automated solution
by Simoni, Jean-Luc & Ulliac, Alexis & Massip, Thomas & Devaux, Thomas
- 79-89 Financial services security risks and remediations
by Arbel, Lior
- 90-91 `Cybercrime through social engineering: The new global crisis` by Chris Kayser
by Wantenaar, Lance
June 2022, Volume 5, Issue 4
- 284-285 Editorial
by Beckett, Simon
- 286-293 The new offensive cyber security: Strategically using asymmetrical tactics to promote information security
by Ott, Christopher
- 294-302 How to stop attackers from owning your Active Directory
by Crandall, Carolyn & Cole, Tony
- 303-315 The imperative of enterprise-grade security for 5G
by Burakovsky, Leonid & Kriz, Danielle
- 316-323 How a well-thought-out incident response can take the advantage back from attackers
by Christiansen, James
- 324-334 Focusing on the primary purpose: Protecting the attorney–client privilege and work product doctrine in incident response
by Taylor, Ashley & Raether, Ron & Mirza, Sadia & Hatcher, Sam & Gill, Bonnie
- 335-349 A modern approach to cyber threat protection: The holy grail of cyber security departments?
by Trocyszyn, Dariusz & Korczyński, Adrian
- 350-360 Eliminating the blind spots: How to be accountable for an organisation’s overall security
by Dryland, Lorraine
- 361-377 A principles-led approach to information assurance and governance in local government
by Brett, Mark
March 2022, Volume 5, Issue 3
- 188-189 Editorial
by Beckett, Simon
- 190-205 Tackling cybercrime and ransomware head-on: Disrupting criminal networks and protecting organisations
by Laitinen, Marja & Armstrong-Smith, Sarah
- 206-215 Paradigm of cyber security transformation in Lithuanian Railways during a pandemic
by Kedys, Antanas & Navickienė, Žaneta & Šlepetys, Rolandas
- 216-226 Application security automation in development
by Kennedy, Mike & Perkins, Chris & Brown, Maria & Prins, Kori
- 227-236 Achieving least privilege at cloud scale with cloud infrastructure entitlements management
by Neelakandhan, Maya & Ramprakash, Guruprasad & Gaidhani, Mrudula
- 237-250 Enabling cyber incident collaboration in UK local government through fast-time communication
by Brett, Mark
- 251-276 How national CSIRTs leverage public data, OSINT and free tools in operational practices: An empirical study
by Kassim, Sharifah Roziah Binti Mohd & Li, Shujun & Arief, Budi
December 2021, Volume 5, Issue 2
- 100-101 Editorial
by Beckett, Simon
- 102-112 Digital contact tracing: Privacy versus efficiency
by Ilves, Ieva
- 113-125 Improving threat detection with a detection development life cycle
by Barros, Augusto
- 126-134 Maturing operational security with an automation-first approach to IAM
by Christ, Bryan
- 135-141 Optimising cyber threat intelligence for your organisation
by Girtz, Christina
- 142-154 Cyber security and data protection: Learning from your own mistakes is good, learning from somebody else’s mistakes is better — the reasons underpinning fines and what regulators expect of cyber security
by Craddock, Peter & Bogget, Eline Van
- 155-163 The high-performing low-risk mainframe: Reassess security in the context of changing operations to extinguish risk before it bursts out of control
by Furno, Mary Ann
- 164-176 Security and safety incidents and standards
by Kemp, Robert & Smith, Richard
September 2021, Volume 5, Issue 1
- 4-5 Call for papers
by Beckett, Simon
- 6-12 The human variable: Designing a security strategy for a future in flux
by Sorrentino, Gary
- 13-26 Staying one step ahead of your adversaries: How to build a cyber threat intelligence team capable of delivering business value
by Nicholson, Keith
- 27-36 Discovering CovidLock
by Anderson, Chad & Saleh, Tarik & Mcnee, Sean M.
- 37-50 Scaling cyber physical systems throughout the organisation
by Leipnik, Matt
- 51-65 Is ransomware winning?
by Goettl, Chris
- 66-79 Home-grown machine learning implementation for a SIRT: A use case — detecting domain-generating algorithms
by Lodge, Brennan
- 80-94 Zero trust computing through the application of information asset registers
by Brett, Mark
June 2021, Volume 4, Issue 4
- 300-301 Editorial
by Beckett, Simon
- 302-316 A framework for quantifying cyber security risks
by Wolthuis, Reinder & Phillipson, Frank & Jongsma, Hidde-Jan & Langenkamp, Peter
- 317-329 Open sesame: Lessons in password-based user authentication
by Rashidi, Bahman & Garg, Vaibhav
- 330-344 An overview of current issues and practice relating to local government cyber security in England and Wales
by Brett, Mark
- 345-367 Cyber security for microreactors in advanced energy systems
by Sabharwall, Piyush & Gibb, James & Ritter, Christopher & Araújo, Kathleen & Gupta, Abhinav & Ferguson, Ian & Rolston, Bri & Fisher, Ron & Gehin, Jess & Ballout, Youssef
- 368-379 The laws governing data breaches: An update
by Dayanim, Behnam & Butler, Roya
- 380-387 Managing stakeholder communication during a cyber crisis
by Sapriel, Caroline
March 2021, Volume 4, Issue 3
- 200-201 Editorial
by Beckett, Simon
- 202-212 Risk is a result of human behaviour: Leveraging behavioural analytics to strengthen internal controls
by Mehta, Arvind
- 213-222 Insider threat programmes: Time to hit restart
by Hanson, Jadee & Thorsen, Todd & Hunstad, Nathan
- 223-231 The human problem behind credential theft and reuse
by Kron, Erich
- 232-242 Know your suppliers: A review of ICT supply chain risk management efforts by the US government and its agencies
by Osunji, Olatunji
- 243-250 International principles for boards of directors and cyber security
by Clinton, Larry
- 251-266 Cyber security for smart cities: End-to-end cyber security strategy for IoT connected services
by Cissé, Moh
- 267-291 Identifying cyber security risks in Spanish airports
by Florido-Benítez, Lázaro
December 2020, Volume 4, Issue 2
- 100-101 Editorial
by Beckett, Simon
- 102-110 The industrial Internet of Things: From preventive to reactive systems — redefining your cyber security game plan for the changing world
by Kipling, Lesley
- 111-121 The complexity of performing cyber audits in the space sector along the supply chain
by Fernandez, Jose Ramon Coz & Pastor Pérez, Vicente José
- 122-134 Cheetahs, COVID-19 and the demand for crypto-agility
by Thelander, Michael
- 135-144 Cyber leadership across a business ecosystem
by Doan, Matthew
- 145-159 A framework for fostering a dynamic information security culture
by Carver, Renay
- 160-181 Vulnerabilities on the wire: Mitigations for insecure ICS device communication
by Hoffman, Michael
- 182-193 The landscape from above: Continuous cloud monitoring for continuous assurance
by Khalil, Fouad
September 2020, Volume 4, Issue 1
- 4-5 Editorial
by Beckett, Simon
- 6-13 Taking risk to the edge of acceptable
by Williamson, Steve
- 14-28 Consider the consequences: Understanding and limiting physical impacts caused by an ICS cyberattack
by Wyman, Richard
- 29-39 Effectively integrating physical security technology into the operational technology domain
by Wharton, Matthew
- 40-47 Users are an intelligence source: Are you leveraging them in your detection strategy?
by Dudley, Tonia
- 48-57 Think like a hacker: Reducing cyber security risk by improving API design and protection
by Giese, Gerhard
- 58-69 The challenge of assessing strategic cyber security risk in organisations and critical infrastructure
by Harry, Charles
- 70-76 What the market is not telling you about the cyber security skills shortage
by Reffold, Karla
- 77-90 Non-traditional cyber adversaries: Combatting human trafficking through data science
by Borrelli, Danielle & Caltagirone, Sherrie
June 2020, Volume 3, Issue 4
- 292-293 Editorial
by Beckett, Simon
- 294-307 Moving target defence: Economics and asymmetry
by Maclean, Don
- 308-314 1-10-60: Measuring the speed of incident response
by Pool, Ronald
- 315-329 What lawyers mean by ‘reasonable’ cyber security controls
by Cronin, Chris
- 330-338 The three Ps of third-party risk
by Sangster, Mark
- 339-350 Cyber incident response approach framework for local government
by Brett, Mark & Wood, Joshua & Parker, Jamie
- 351-362 Hacking humans: A case study and analysis of vulnerabilities in the advancing medical device landscape
by Hempel, Gabrielle & Janosek, Diane Brady & Raziano, Donna Brady
- 363-378 The role of information about opponent’s actions and intrusion-detection alerts on cyber decisions in cyber security games
by Aggarwal, Palvi & Dutt, Varun
March 2020, Volume 3, Issue 3
- 193-194 Editorial
by Beckett, Simon
- 195-207 Security and privacy risks in the blockchain ecosystem
by Bartoletti, Ivana & Plantié, Samuel & Sambodaran, Arun
- 208-219 IT modernisation in the energy sector: Preventing cyberthreats to critical infrastructure
by Isom, Pamela K.
- 220-232 The European Commission goes ‘cloud first’: A roadmap towards trusted cloud adoption to seize the opportunities of digital transformation for EU institutions and agencies
by Ducatel, Ken & Michlmayr, Thomas & Merle, Philippe & Baskovc, Dalibor & Mestre, François
- 233-255 ADDRR: A counter kill chain cyber security model
by Henneberg, Alex
- 256-264 Zero trust in an all too trusting world
by Caron, Gerald
- 265-274 Security monitoring strategies for your OT infrastructure
by Jbair, Mohammad
- 275-286 Evaluating cyber risk reporting in US financial reports
by Fisher, Ron & Wood, Justin & Porod, Celia & Greco, Lydia
December 2019, Volume 3, Issue 2
- 100-102 Call to arms: A holistic security approach for a changing threat landscape
by Grassie, Richard P.
- 103-115 Third-party risk management: Strategy to mitigate ‘on-premise’ and ‘cloud’ cyber security risks
by Cissé, Moh
- 116-123 Digital twins, the industrial Internet of Things and cyber security threats in connected industry
by Hearn, Mark
- 124-133 A strategic approach to cyber security risk reduction for FX in the cloud using people, processes and technology
by Lee-Browne, Rupert
- 134-144 Managing the hypercomplexity of cyber security regulation: In search of a regulatory Rosetta Stone
by Paul Greene, F.
- 145-158 Healthcare cyber security and HIPAA assurance with business associates
by Ahlstrom, Janice & Tait, Christopher & Zoline, Kenneth
- 159-174 Preventing cybercrime: A framework for understanding the role of human vulnerabilities
by Kayser, Christopher S. & Ellen Mastrorilli, Mary & Cadigan, Robert
- 175-185 The nature of society: Are certain cultures less predisposed to cyberthreats than others? An examination using the example of Germany
by Werne, Jochen
September 2019, Volume 3, Issue 1
- 4-5 Call for papers
by Beckett, Simon
- 6-13 Impersonation fraud scenarios: How to protect, detect and respond
by Bruno, Mario
- 14-24 Doing risk management correctly
by Frietzsche, Randall
- 25-36 Examining the relationship between formal RMF training and perceptions of RMF effectiveness, sustainability and commitment in RMF practitioners
by Schall, Philip D. & Oni, Oludotun
- 37-43 Surviving ransom driven DDoS extortion campaigns
by Newman, Sean
- 44-56 Resilience to combined attacks
by Winks, David
- 57-72 A data privacy approach for cyber-physical systems
by Weldert, Jan & Von Wedel, Jana Karina & Beul, Christian
- 73-92 Cyber security and human resource development implications for the enterprise
by Gillam, Andrew R.
June 2019, Volume 2, Issue 4