Cyber Security: A Peer-Reviewed Journal
2017 - 2025
From Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().
Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 9, issue 2, 2025
- Editorial pp. 112-113

- Simon Beckett
- Integrating identity and access management and privileged access management for enhanced identity security in financial institutions: A zero-trust approach pp. 114-129

- Felix Behringer and Patrick Baumann
- AI with humans in mind: The importance of human behavioural considerations in AI design and adoption pp. 130-138

- Hanah-Marie Darley
- Securing identities in software development life cycles pp. 139-148

- Maya Neelakandhan, Guruprasad Ramprakash and Deepika Gautam
- Creating an effective cyber security culture in regulated financial services companies pp. 149-158

- Rupert Lee-Browne
- Practical cyber security architecture: Introducing a practical model for resilience pp. 159-171

- Eleni Richter
- A holistic approach to cyber security in local government: A practice-based perspective pp. 172-187

- Mark Brett
- Examining generational impacts of machine learning, artificial intelligence, generative AI and deepfake-based social engineering cybercrime pp. 188-202

- Christopher S. Kayser
Volume 9, issue 1, 2025
- Editorial pp. 4-5

- Simon Beckett
- Is it time to consider a radical change in the way we organise and manage the response to cybercrime? pp. 6-17

- Simon Newman
- Rethinking user password management pp. 18-26

- Bryan Christ
- Developing cyber resilience through cyber incident response capability improvement: Presenting the cyber incident response capability development life cycle model pp. 27-39

- Murray Goldschmidt
- SPOT: A data-driven threat detection framework with knowledge-enhanced scoring pp. 40-48

- Derek Lin
- Govern once/comply many: Leveraging cyber security framework experience to support AI governance pp. 49-60

- F. Paul Greene
- The art of cyber war: Sun Tzu’s ancient wisdom in modern threat intelligence pp. 61-71

- Lior Arbel
- Security audits on artificial intelligence systems pp. 72-78

- Robert Kemp
- Why failure to comply with state contract cyber security and privacy requirements is increasingly likely to result in State Attorneys General enforcement pp. 79-87

- Ashley L. Taylor, Gene Fishel and Dan Waltz
- The artificial intelligence security zugzwang pp. 88-106

- Lampis Alevizos
Volume 8, issue 4, 2025
- Editorial pp. 304-305

- Simon Beckett
- Intelligence led risk: Leveraging threat operations to deliver effective risk management pp. 306-320

- Keith Nicholson
- Navigating the GenAI frontier: The role of the CISO in GenAI governance pp. 321-336

- James Christiansen
- Enhancing cybercrime investigations: Orchestration of automation and public–private collaboration to combat online payment fraud in Ukraine pp. 337-347

- Olesya Danylchenko
- Defence from an attacker’s view: Rethinking traditional approaches to cyber security pp. 348-360

- Jonathan Freedman
- Shifting from operational to risk-based response to vulnerabilities and exposures pp. 361-374

- Chris Goettl
- The financial impact of cyberattacks: Comparative study of the manufacturing and service industry pp. 375-391

- Joseph Squillace, Justice Cappella and Ahmet Doğuhan Altaş
- Leveraging generative AI for dynamic file honeypots: Insights and implementation pp. 392-400

- Vladimir Strogov and Sergey Ulasen
Volume 8, issue 3, 2025
- Editorial pp. 196-197

- Simon Beckett
- AI in cyber security: A dual perspective on hacker tactics and defensive strategies pp. 198-213

- Lawrence Amer
- Applying forensic engineering to cyber security incidents pp. 214-221

- Jason Jordaan
- Preparing for the implementation of reporting requirements from new EU and UK product and cyber security legislation pp. 222-231

- Gaus Rajnović
- How to secure development environments pp. 232-242

- Gerd Giese and Frank Bartel
- Data minimisation: A crucial pillar of cyber security pp. 243-254

- Paul Luehr and Brandon Reilly
- Seeking harmony: CISA’s proposed cyber reporting rules for critical infrastructure are an ambitious work in progress pp. 255-263

- Joseph C. Folio Iii, Alexandra Ross, Ian Wolfe and Nicholas A. Weigel
- Cyber threat intelligence in practice: Implications of the blurred lines between public and private intelligence activity pp. 264-272

- Neil Ashdown and Keith Martin
- Fast-changing cyber threat landscape and a new reality of cyber security pp. 273-280

- Antanas Kedys
- Differences between traditional network security and security in the cloud pp. 281-298

- Ilya Verbitskiy
Volume 8, issue 2, 2024
- Editorial pp. 100-101

- Simon Beckett
- Three approaches to foster organisational cohesion and reduce friction for cyber and security teams pp. 102-109

- Elizabeth Wanic and Bradley Smith
- From compliance to impact: Tracing the transformation of an organisational security awareness programme pp. 110-130

- Julie Haney and Wayne Lutters
- How to mitigate ransomware risk through data and risk quantification pp. 131-149

- Erik Sørup Andersen
- Crumbling bridges: The failed economics of software maintenance pp. 150-159

- Jc Herz
- Why crisis leadership competencies matter in the effective management of a cyber crisis pp. 160-168

- Caroline Sapriel
- Guidelines for non-profit organisation governance in cyber resilience pp. 169-176

- Margaret Mavins Johnson
- Your decision: Senior professionals’ decision making during a simulated ransomware attack pp. 177-188

- Fabian Muhly and Philipp Leo
Volume 8, issue 1, 2024
- Editorial pp. 4-5

- Simon Beckett
- Common pitfalls when mitigating cyber risk: Addressing socio-behavioural factors pp. 6-23

- Öykü Işik, Yanya Viskovich and Si Pavitt
- Improving cyber risk governance through storytelling pp. 24-37

- Levi Gundert
- AI detection of malicious push notifications in augmented reality in the workplace pp. 38-47

- Sarah Katz
- Obstacles and countermeasures for protecting Internet of Things devices from emerging security risks pp. 48-62

- Chahak Mittal
- Identifying and classifying cyberattacks on airports pp. 63-79

- Lázaro Florido-Benítez
- Strong reasons make strong actions: What Shakespeare’s ‘King John’ can teach us about the Internet of Things pp. 80-90

- Hanane Taidi