Contact information of Henry Stewart Publications
Serial Information
Download restrictions: Requires a paid subscription for full access.
Description: Cyber Security is the major peer-reviewed journal publishing in-depth articles and case studies written by and for cyber security professionals. It showcases the latest thinking and best practices in cyber security, cyber resilience, cyber crime and cyber warfare, drawing on practical experience in national critical infrastructure, government, corporate, finance, military and not-for-profit sectors. Subjects covered include: cyber security risk assessments; cyber response programmes; protective measures; threat surface analysis and detection; training ‘red’ teams; crisis and reputation management; data breaches; awareness, education and training; workforce analysis; cyber security in the supply chain; insider threats; cloud security risk; cyber warfare, cyber terrorism and state-sponsored attacks; safe disposal of data; cyber security investigations and digital/analogue forensics; hackers’ techniques and motivations; security architectures and network assurance; internet fraud techniques; encryption, cryptology and data protection; user behaviour analytics.
Series handle: RePEc:aza:csj000
Citations RSS feed: at CitEc
Impact factors
Access and download statisticsTop item:
Corrections
All material on this site has been provided by the respective publishers and authors. You can help
correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:aza:csj000. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Henry Stewart Talks (email available below). General contact details of provider: .
Content
June 2019, Volume 2, Issue 4
December 2018, Volume 2, Issue 3
- 200-201 Editorial
by Beckett, Simon
- 202-210 Framing cyber security as a business risk
by Wheeler, Evan
- 211-218 Insider threat detection: Where and how data science applies
by Lin, Derek
- 219-227 DevOps security improvements through effective use of container technology
by Goldschmidt, Murray
- 228-237 How can we effectively regulate grid security?
by Alrich, Tom
- 238-250 Strategic trends in the global cyber conflict
by Baram, Gil & Cohen, Daniel & Shapira, Zeev & Wechsler, Omree & Hight, Nir & Ben-Israel, Isaac
- 251-261 SOC 2030: Security Operations centres are broken, let’s fix them
by Matre, Kerry
- 262-269 Preventing cryptocurrency theft: Learning from the past to secure the future
by Kater, Amos & Jamieson, Andrew
- 270-285 Risk perceptions of electronic health records
by Le, Patricia & Tsiang, Michael & Hekmatjah, Natan & Katona, Peter
September 2018, Volume 2, Issue 2
- 104-105 Editorial
by Beckett, Simon
- 106-113 The cyberthreat facing the financial services industry
by Antonacci, Pat
- 114-121 Best practices in creating a vulnerability assessment programme: Measure twice and cut once, avoiding costly mistakes
by Cowen, Christopher
- 122-130 Emerging trends in insurance coverage: Massive encryption attacks create urgent need for business interruption and cyber coverage
by Hoar, Sean & Marchel, Peter M.
- 131-142 Risky travel: The missing piece for holistic cyber security risk management
by Cissé, Moh
- 143-148 The impact of GDPR on WHOIS: Implications for businesses facing cybercrime
by Ferrante, Anthony J.
- 149-162 One way to better cyber resilience in the financial sector: The Danish approach
by Thomsen, René & Kaas-Jacobsen, Gustav
- 163-172 Small and medium enterprises: Analysing the cyber challenge
by Riglietti, Gianluca & Alcantara, Patrick & Aguada, Lucila
- 173-180 Staying one step ahead of the GDPR: Embed privacy and security by design
by Cavoukian, Ann
- 181-192 Measurement of organisational variables associated with cyber security preparedness in Turkey
by Can, S. Hakan & Ikitemur, Gokhan & Hendy, Helen M.
June 2018, Volume 2, Issue 1
- 4-5 Editorial
by Butlin, Bonnie
- 6-16 Banking phishing: The case of Brazil
by Brasil, Beatriz Silveira & Campelo, Karina Correia Figueiredo
- 17-22 From panic to pragmatism: De-escalating and managing commercial data breaches
by Thomas, Liisa & Thomson, Amber C.
- 23-30 GDPR and employee data protection: Cyber security data example
by Watson, Deborah & Millerick, Ryan
- 31-37 Reflections on CIO research: The essential qualities sought after when hiring today’s cyber security leaders
by Pales, Claire
- 38-50 #SafeCard: Ukraine’s answer to cyberthreats targeting cardholders
by Danylchenko, Olesya
- 51-65 An effective approach to addressing human security vulnerability in an organisation
by Sedova, Masha
- 66-72 Staying safe in an increasingly interconnected world: IOT and Cybersecurity
by Payton, Theresa
- 73-82 PCI DSS and card brands: Standards, compliance and enforcement
by Wilson, Donna & Roman, Ethan & Beierly, Ingrid
- 83-89 Purchasing and understanding cyber insurance coverage
by Selby, Judy
- 90-97 ‘Reasonable security’: A moving target
by Mcginn, Elizabeth E. & Shreve, James & Tank, Margo H. K.
March 2018, Volume 1, Issue 4
- 292-293 Editorial
by Beckett, Simon
- 294-300 Should cyber security be included in compliance training?
by Chmiel, Piotr
- 301-315 Data breach litigation and regulatory enforcement: A survey of our present and how to prepare for the future
by Dayanim, Behnam & George, Edward
- 316-325 Identity crisis: Detecting account opening fraud in the age of identity commoditisation
by Rivner, Uri
- 326-330 The human factor in cyber security
by Sotira, Nicola
- 331-342 Normative restraints on cyber conflict
by Nye, Joseph S.
- 343-350 Effective foundational security principles
by Kron, Erich
- 351-360 Human aspects of cyber security: Behaviour or culture change?
by Joinson, Adam & Steen, Tommy Van
- 361-367 Chief Information Security Officer best practices for 2018: Proactive cyber security
by Rosiek, Travis
- 368-376 Cyberattacks survival guide
by Naveh, Gadi
December 2017, Volume 1, Issue 3
- 197-198 Editorial
by Carpenter, Mike
- 199-206 Memory protection challenges: Attacks on memory encryption
by Branco, Rodrigo Rubira & Gueron, Shay
- 207-217 The NIST Risk Management Framework: Problems and recommendations
by Maclean, Don
- 218-226 Strategic decision making in cyber security: Lessons learned
by Habermayer, Helmut
- 227-240 Cyber defence capability development for common security and defence policy of the European Union: A critical look back and ahead
by Röhrig, Wolfgang
- 241-250 Successfully tackling cybercrime at the local level
by Haslam, Andy
- 251-258 Cyber insurance comes of age
by Tungatt, Gareth
- 259-272 Protocol analysis and vulnerabilities of Cisco’s autonomic network
by Eissa, Omar
- 273-284 ‘Imagine if …’: The power of storytelling in building business resilience
by Wilding, Nick
September 2017, Volume 1, Issue 2
- 100-101 Editorial
by Beckett, Simon
- 102-115 Cyber incidents: How best to work with law enforcement
by Laufman, David H. & Newell, Sean & Reynolds, Stephen & Buchwald, Mike
- 116-126 Is your information security ecosystem consuming poisonous information and putting your enterprise at risk?
by Mackay, Gordon
- 127-133 How machine learning is catching up with the insider threat
by Graves, Jamie
- 134-146 Cyber resilience: Leadership matters
by Armour, Cathie
- 147-155 Protecting the crown jewels of the government through infrastructure resilience and the DHS Continuous Diagnostics and Mitigation programme
by Cox, Kevin & Kneidinger, Mark
- 156-164 Cyber security talks: A content analysis of online discussions on ransomware
by Riglietti, Gianluca
- 165-174 NATO: Stepping up its game in cyber defence
by Shea, Jamie
- 175-186 Node.js Security
by Verbitskiy, Ilya
June 2017, Volume 1, Issue 1
- 4-5 Editorial
by Unknown
- 6-15 A security evolution driven by the Internet of Intelligent Things
by Williamson, Steve P.
- 16-27 Changing the rules of the game: How can law enforcement deter criminals by increasing the risks of conducting cybercrime?
by Amann, Philipp & Klayn, Aglika & Mounier, Grégory
- 28-43 Consider the consequences: A powerful approach for reducing ICS cyber risk
by Wyman, Richard
- 44-47 The fight within encryption
by Basu, Sammy
- 48-60 Cyber as NATO’s newest operational domain: The pathway to implementation
by Athanasiadis, Christos & Ali, Rizwan
- 61-68 Industry 4.0: Security imperatives for IoT — converging networks, increasing risks
by Bligh-Wall, Shaun
- 69-79 Partner or perish: Research collaboration to secure cyberspace
by Parker, Gareth & Zelinsky, Alex
- 80-91 Multi-vector threats and the argument for greater convergence
by Chandler, Ron & Hambly, Brent & Holcomb, Jason & Ressopoulos, George & Wharton, Matthew
- 92-94 Cyber risk valuation: Show me the money
by Sapp, John B.