Cyber Security: A Peer-Reviewed Journal
2017 - 2025
From Henry Stewart Publications Bibliographic data for series maintained by Henry Stewart Talks (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 6, issue 4, 2023
- Editorial pp. 292-293

- Simon Beckett
- How CISOs can truly align with the business pp. 294-300

- Candy Alexander
- Machine learning or behaviour heuristics? The synergy of approaches to defeat advanced ransomware threats pp. 301-310

- Vladimir Strogov and Sergey Ulasen
- The curse of knowledge can damage awareness programmes: Here's how to defeat it pp. 311-319

- Kerry Tomlinson
- Privacy threats and vulnerabilities: Reinvent your privacy engineering practices and win pp. 320-333

- Smitha Sriharsha
- Analysis of software bill of materials tools pp. 334-355

- Arushi Arora and Christina Garman
- The human side of cybercrime pp. 356-365

- Kylie Watson and Tayla Payne
- A strong story to tell: Top ten mistakes by administrators pp. 366-372

- Paula Januszkiewicz
- An approach to establishing a multi-organisational public sector security operations centre pp. 373-383

- Mark Brett
Volume 6, issue 3, 2023
- Editorial pp. 196-197

- Simon Beckett
- Building a high-performing data ethics programme from the ground up pp. 198-210

- Alexandra Ross, Ilana Golbin and Bret S. Cohen
- Dangers of succumbing to bias in cyber security: An evaluation of the impact of cognitive biases on threat assessments and cyber security strategies pp. 211-219

- Hanah-Marie Darley
- The Zoom effect: A framework for security programme transformation pp. 220-229

- Heather Ceylan and Ariel Chavan
- Users are not stupid: Six cyber security pitfalls overturned pp. 230-241

- Julie Haney
- Improving your Active Directory security posture: AdminSDHolder to the rescue pp. 242-260

- Guido Grillenmeier
- The psychology of social engineering pp. 261-274

- Barry Coatesworth
- OTP bots and crypto: A tactic to disrupt pp. 275-284

- Kristen Spaeth
Volume 6, issue 2, 2022
- Editorial pp. 100-101

- Simon Beckett
- Social engineering and the use of persuasion to commit cyber fraud pp. 102-110

- Lance Wantenaar
- Threat intelligence meets risk management for operational resilience pp. 111-118

- Teresa T. Walsh
- Think beyond IT security — cyber resilience to build future-ready world: OT and ICS, critical infrastructure and beyond pp. 119-131

- Sanam Makadia
- The how and why of cyber security policy: Create behavioural and technical rules to mitigate risk pp. 132-140

- Jael Lewis and Cara E. Turbyfill
- Browser isolation as an enterprise security control pp. 141-147

- Henry Harrison
- Why deep learning holds the key to preventing cyberattacks before they can strike pp. 148-153

- Karen Crowley
- Exploring phronesis in cyber security, management and resilience pp. 154-167

- Mark Brett
- Mitigating challenges in an evolving cyber threat landscape pp. 168-177

- Benjamin Ang
- Malware development threats with modern technologies pp. 178-187

- Lawrence Amer
Volume 6, issue 1, 2022
- Editorial pp. 4-5

- Simon Beckett
- Securing decentralised organisations pp. 6-13

- Damir Rajnović
- Anomaly-based threat detection: Behavioural fingerprinting versus self-learning AI pp. 14-25

- Jeff Cornelius, Simon Fellows, Oakley Cox and Sam Lister
- A security concept for a global factory network: Practical considerations in implementation pp. 26-33

- Michael Voeth, Clare Patterson and Jannis Stemmann
- The insider threat to financial services: Why a shift in mindset is required to combat this silent risk pp. 34-40

- Dave Harvey
- Active Directory security: Why we fail and what auditors miss pp. 41-51

- Sylvain Cortes
- Integration versus convergence: A battle of the buzzwords? pp. 52-61

- Rodman Ramezanian
- The PIVO process for identifying vulnerabilities impact for organisation risks: An automated solution pp. 62-78

- Jean-Luc Simoni, Alexis Ulliac, Thomas Massip and Thomas Devaux
- Financial services security risks and remediations pp. 79-89

- Lior Arbel
- `Cybercrime through social engineering: The new global crisis` by Chris Kayser pp. 90-91

- Lance Wantenaar
Volume 5, issue 4, 2022
- Editorial pp. 284-285

- Simon Beckett
- The new offensive cyber security: Strategically using asymmetrical tactics to promote information security pp. 286-293

- Christopher Ott
- How to stop attackers from owning your Active Directory pp. 294-302

- Carolyn Crandall and Tony Cole
- The imperative of enterprise-grade security for 5G pp. 303-315

- Leonid Burakovsky and Danielle Kriz
- How a well-thought-out incident response can take the advantage back from attackers pp. 316-323

- James Christiansen
- Focusing on the primary purpose: Protecting the attorney–client privilege and work product doctrine in incident response pp. 324-334

- Ashley Taylor, Ron Raether, Sadia Mirza, Sam Hatcher and Bonnie Gill
- A modern approach to cyber threat protection: The holy grail of cyber security departments? pp. 335-349

- Dariusz Trocyszyn and Adrian Korczyński
- Eliminating the blind spots: How to be accountable for an organisation’s overall security pp. 350-360

- Lorraine Dryland
- A principles-led approach to information assurance and governance in local government pp. 361-377

- Mark Brett
Volume 5, issue 3, 2022
- Editorial pp. 188-189

- Simon Beckett
- Tackling cybercrime and ransomware head-on: Disrupting criminal networks and protecting organisations pp. 190-205

- Marja Laitinen and Sarah Armstrong-Smith
- Paradigm of cyber security transformation in Lithuanian Railways during a pandemic pp. 206-215

- Antanas Kedys, Žaneta Navickienė and Rolandas Šlepetys
- Application security automation in development pp. 216-226

- Mike Kennedy, Chris Perkins, Maria Brown and Kori Prins
- Achieving least privilege at cloud scale with cloud infrastructure entitlements management pp. 227-236

- Maya Neelakandhan, Guruprasad Ramprakash and Mrudula Gaidhani
- Enabling cyber incident collaboration in UK local government through fast-time communication pp. 237-250

- Mark Brett
- How national CSIRTs leverage public data, OSINT and free tools in operational practices: An empirical study pp. 251-276

- Sharifah Roziah Binti Mohd Kassim, Shujun Li and Budi Arief
Volume 5, issue 2, 2021
- Editorial pp. 100-101

- Simon Beckett
- Digital contact tracing: Privacy versus efficiency pp. 102-112

- Ieva Ilves
- Improving threat detection with a detection development life cycle pp. 113-125

- Augusto Barros
- Maturing operational security with an automation-first approach to IAM pp. 126-134

- Bryan Christ
- Optimising cyber threat intelligence for your organisation pp. 135-141

- Christina Girtz
- Cyber security and data protection: Learning from your own mistakes is good, learning from somebody else’s mistakes is better — the reasons underpinning fines and what regulators expect of cyber security pp. 142-154

- Peter Craddock and Eline Van Bogget
- The high-performing low-risk mainframe: Reassess security in the context of changing operations to extinguish risk before it bursts out of control pp. 155-163

- Mary Ann Furno
- Security and safety incidents and standards pp. 164-176

- Robert Kemp and Richard Smith
Volume 5, issue 1, 2021
- Call for papers pp. 4-5

- Simon Beckett
- The human variable: Designing a security strategy for a future in flux pp. 6-12

- Gary Sorrentino
- Staying one step ahead of your adversaries: How to build a cyber threat intelligence team capable of delivering business value pp. 13-26

- Keith Nicholson
- Discovering CovidLock pp. 27-36

- Chad Anderson, Tarik Saleh and Sean M. Mcnee
- Scaling cyber physical systems throughout the organisation pp. 37-50

- Matt Leipnik
- Is ransomware winning? pp. 51-65

- Chris Goettl
- Home-grown machine learning implementation for a SIRT: A use case — detecting domain-generating algorithms pp. 66-79

- Brennan Lodge
- Zero trust computing through the application of information asset registers pp. 80-94

- Mark Brett
| |