Cyber Security: A Peer-Reviewed Journal
2017 - 2025
From Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().
Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 8, issue 3, 2025
- Editorial pp. 196-197

- Simon Beckett
- AI in cyber security: A dual perspective on hacker tactics and defensive strategies pp. 198-213

- Lawrence Amer
- Applying forensic engineering to cyber security incidents pp. 214-221

- Jason Jordaan
- Preparing for the implementation of reporting requirements from new EU and UK product and cyber security legislation pp. 222-231

- Gaus Rajnović
- How to secure development environments pp. 232-242

- Gerd Giese and Frank Bartel
- Data minimisation: A crucial pillar of cyber security pp. 243-254

- Paul Luehr and Brandon Reilly
- Seeking harmony: CISA’s proposed cyber reporting rules for critical infrastructure are an ambitious work in progress pp. 255-263

- Joseph C. Folio Iii, Alexandra Ross, Ian Wolfe and Nicholas A. Weigel
- Cyber threat intelligence in practice: Implications of the blurred lines between public and private intelligence activity pp. 264-272

- Neil Ashdown and Keith Martin
- Fast-changing cyber threat landscape and a new reality of cyber security pp. 273-280

- Antanas Kedys
- Differences between traditional network security and security in the cloud pp. 281-298

- Ilya Verbitskiy
Volume 8, issue 2, 2024
- Editorial pp. 100-101

- Simon Beckett
- Three approaches to foster organisational cohesion and reduce friction for cyber and security teams pp. 102-109

- Elizabeth Wanic and Bradley Smith
- From compliance to impact: Tracing the transformation of an organisational security awareness programme pp. 110-130

- Julie Haney and Wayne Lutters
- How to mitigate ransomware risk through data and risk quantification pp. 131-149

- Erik Sørup Andersen
- Crumbling bridges: The failed economics of software maintenance pp. 150-159

- Jc Herz
- Why crisis leadership competencies matter in the effective management of a cyber crisis pp. 160-168

- Caroline Sapriel
- Guidelines for non-profit organisation governance in cyber resilience pp. 169-176

- Margaret Mavins Johnson
- Your decision: Senior professionals’ decision making during a simulated ransomware attack pp. 177-188

- Fabian Muhly and Philipp Leo
Volume 8, issue 1, 2024
- Editorial pp. 4-5

- Simon Beckett
- Common pitfalls when mitigating cyber risk: Addressing socio-behavioural factors pp. 6-23

- Öykü Işik, Yanya Viskovich and Si Pavitt
- Improving cyber risk governance through storytelling pp. 24-37

- Levi Gundert
- AI detection of malicious push notifications in augmented reality in the workplace pp. 38-47

- Sarah Katz
- Obstacles and countermeasures for protecting Internet of Things devices from emerging security risks pp. 48-62

- Chahak Mittal
- Identifying and classifying cyberattacks on airports pp. 63-79

- Lázaro Florido-Benítez
- Strong reasons make strong actions: What Shakespeare’s ‘King John’ can teach us about the Internet of Things pp. 80-90

- Hanane Taidi
Volume 7, issue 4, 2024
- Editorial pp. 288-289

- Simon Beckett
- A guide to evaluating AI vendors: Key questions to mitigate security risks pp. 290-306

- Davi Ottenheimer
- Understanding and prioritising cyberattack paths amid growing organisational complexity pp. 307-322

- Elliott Went
- Red Team testing: Essential KPIs and metrics pp. 323-332

- Richard Hollis
- Bridging the gap between IT and OT to improve industrial cyber security pp. 333-341

- Dino Busalachi
- Analysing and managing risk from third-party OAuth application access pp. 342-362

- Jenko Hwong
- Security testing as part of a digital assurance toolkit pp. 363-370

- Graeme Huddy
- The challenge of securing electric vehicle charger infrastructure pp. 371-382

- Thomas Caldwell
Volume 7, issue 3, 2024
- Editorial pp. 197-198

- Simon Beckett
- Consequence is not enough: The role of cyber intelligence in improving cyberattack estimates pp. 199-206

- Sarah Freeman and Mark Bristow
- Purple Teaming: A comprehensive and collaborative approach to cyber security pp. 207-216

- Erik Van Buggenhout
- Improving likelihood calculation by mapping MITRE ATT&CK to existing controls pp. 217-228

- Gerald Beuchelt and Sonal Agrawal
- The EU Cybersecurity Skills Academy: A silver bullet to address the cyber security skills gap in the European Union? pp. 229-236

- Despina Spanou
- Issues to consider relating to information governance and artificial intelligence pp. 237-252

- Mark Brett
- How can national policies support the development and implementation of coordinated vulnerability disclosure? pp. 253-261

- Valéry Vander Geeten
- Online Potemkin villages: Discovering a Russian influence operation on social media pp. 262-272

- Patricia Bailey
- Caught in the web: Pitfalls of electronic communications pp. 273-278

- E. J. Yerzak
Volume 7, issue 2, 2023
- Editorial pp. 100-101

- Simon Beckett
- How processes affect IT-systems and business complexity, and what correlations are present pp. 102-109

- Reidar J. Boldevin
- Reducing complexity in cyber security architecture: A practical model for security classifications pp. 110-119

- Eleni Richter
- How to get your board and executive team cyber-ready and achieve a culture of cyber security from the board down: The CEO Method™ for breach prevention pp. 120-144

- Andrzej Cetnarski
- The post-breach threat landscape and the need for an ‘effective’ compliance programme pp. 145-153

- Brian Mitchell Warshawsky
- Cyber security culture as a strategic asset pp. 154-162

- Glendon Schmitz
- A case for public support for vulnerability disclosure policies pp. 163-171

- Francesco Bordone
- Why policy-based authorisation is critical for identity-first security pp. 172-180

- Gal Helemski
- The vital importance of a successful threat intelligence programme pp. 181-187

- Yochai Corem
Volume 7, issue 1, 2023
- Editorial pp. 4-5

- Simon Beckett
- Beyond detection: Uncovering unknown threats pp. 6-15

- George Chen
- Legacy apps to cloud: A risk-based approach pp. 16-23

- Naresh Sharma
- Exploring the practicalities and quality of pentesting at scale: Globally, pentest coverage is increasing but remains insufficient pp. 24-32

- Caroline Wong
- CIO and CISO collaboration for a shared vision that enables a cyber-resilient future pp. 33-43

- Nastassja Van Den Heever
- When push comes to shove: Managing strong personalities in a cyber incident pp. 44-51

- Mark Sangster
- Approaches to cyber security in small and medium-sized enterprises: Why it needs to change pp. 52-62

- Simon Newman
- From stress to success: Neuroscience-informed training for cyber security first responders pp. 63-72

- Carol Barkes and Colby Jones
- Cryptography works, but needs a system-wide view pp. 73-81

- Keith Martin
- European cyber security law in 2023: A review of the advances in the Network and Information Security 2 Directive 2022/2555 pp. 82-92

- Charanjit Singh