Cyber Security: A Peer-Reviewed Journal
2017 - 2025
From Henry Stewart Publications Bibliographic data for series maintained by Henry Stewart Talks (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 7, issue 4, 2024
- Editorial pp. 288-289

- Simon Beckett
- A guide to evaluating AI vendors: Key questions to mitigate security risks pp. 290-306

- Davi Ottenheimer
- Understanding and prioritising cyberattack paths amid growing organisational complexity pp. 307-322

- Elliott Went
- Red Team testing: Essential KPIs and metrics pp. 323-332

- Richard Hollis
- Bridging the gap between IT and OT to improve industrial cyber security pp. 333-341

- Dino Busalachi
- Analysing and managing risk from third-party OAuth application access pp. 342-362

- Jenko Hwong
- Security testing as part of a digital assurance toolkit pp. 363-370

- Graeme Huddy
- The challenge of securing electric vehicle charger infrastructure pp. 371-382

- Thomas Caldwell
Volume 7, issue 3, 2024
- Editorial pp. 197-198

- Simon Beckett
- Consequence is not enough: The role of cyber intelligence in improving cyberattack estimates pp. 199-206

- Sarah Freeman and Mark Bristow
- Purple Teaming: A comprehensive and collaborative approach to cyber security pp. 207-216

- Erik Van Buggenhout
- Improving likelihood calculation by mapping MITRE ATT&CK to existing controls pp. 217-228

- Gerald Beuchelt and Sonal Agrawal
- The EU Cybersecurity Skills Academy: A silver bullet to address the cyber security skills gap in the European Union? pp. 229-236

- Despina Spanou
- Issues to consider relating to information governance and artificial intelligence pp. 237-252

- Mark Brett
- How can national policies support the development and implementation of coordinated vulnerability disclosure? pp. 253-261

- Valéry Vander Geeten
- Online Potemkin villages: Discovering a Russian influence operation on social media pp. 262-272

- Patricia Bailey
- Caught in the web: Pitfalls of electronic communications pp. 273-278

- E. J. Yerzak
Volume 7, issue 2, 2023
- Editorial pp. 100-101

- Simon Beckett
- How processes affect IT-systems and business complexity, and what correlations are present pp. 102-109

- Reidar J. Boldevin
- Reducing complexity in cyber security architecture: A practical model for security classifications pp. 110-119

- Eleni Richter
- How to get your board and executive team cyber-ready and achieve a culture of cyber security from the board down: The CEO Method™ for breach prevention pp. 120-144

- Andrzej Cetnarski
- The post-breach threat landscape and the need for an ‘effective’ compliance programme pp. 145-153

- Brian Mitchell Warshawsky
- Cyber security culture as a strategic asset pp. 154-162

- Glendon Schmitz
- A case for public support for vulnerability disclosure policies pp. 163-171

- Francesco Bordone
- Why policy-based authorisation is critical for identity-first security pp. 172-180

- Gal Helemski
- The vital importance of a successful threat intelligence programme pp. 181-187

- Yochai Corem
Volume 7, issue 1, 2023
- Editorial pp. 4-5

- Simon Beckett
- Beyond detection: Uncovering unknown threats pp. 6-15

- George Chen
- Legacy apps to cloud: A risk-based approach pp. 16-23

- Naresh Sharma
- Exploring the practicalities and quality of pentesting at scale: Globally, pentest coverage is increasing but remains insufficient pp. 24-32

- Caroline Wong
- CIO and CISO collaboration for a shared vision that enables a cyber-resilient future pp. 33-43

- Nastassja Van Den Heever
- When push comes to shove: Managing strong personalities in a cyber incident pp. 44-51

- Mark Sangster
- Approaches to cyber security in small and medium-sized enterprises: Why it needs to change pp. 52-62

- Simon Newman
- From stress to success: Neuroscience-informed training for cyber security first responders pp. 63-72

- Carol Barkes and Colby Jones
- Cryptography works, but needs a system-wide view pp. 73-81

- Keith Martin
- European cyber security law in 2023: A review of the advances in the Network and Information Security 2 Directive 2022/2555 pp. 82-92

- Charanjit Singh
Volume 6, issue 4, 2023
- Editorial pp. 292-293

- Simon Beckett
- How CISOs can truly align with the business pp. 294-300

- Candy Alexander
- Machine learning or behaviour heuristics? The synergy of approaches to defeat advanced ransomware threats pp. 301-310

- Vladimir Strogov and Sergey Ulasen
- The curse of knowledge can damage awareness programmes: Here's how to defeat it pp. 311-319

- Kerry Tomlinson
- Privacy threats and vulnerabilities: Reinvent your privacy engineering practices and win pp. 320-333

- Smitha Sriharsha
- Analysis of software bill of materials tools pp. 334-355

- Arushi Arora and Christina Garman
- The human side of cybercrime pp. 356-365

- Kylie Watson and Tayla Payne
- A strong story to tell: Top ten mistakes by administrators pp. 366-372

- Paula Januszkiewicz
- An approach to establishing a multi-organisational public sector security operations centre pp. 373-383

- Mark Brett
Volume 6, issue 3, 2023
- Editorial pp. 196-197

- Simon Beckett
- Building a high-performing data ethics programme from the ground up pp. 198-210

- Alexandra Ross, Ilana Golbin and Bret S. Cohen
- Dangers of succumbing to bias in cyber security: An evaluation of the impact of cognitive biases on threat assessments and cyber security strategies pp. 211-219

- Hanah-Marie Darley
- The Zoom effect: A framework for security programme transformation pp. 220-229

- Heather Ceylan and Ariel Chavan
- Users are not stupid: Six cyber security pitfalls overturned pp. 230-241

- Julie Haney
- Improving your Active Directory security posture: AdminSDHolder to the rescue pp. 242-260

- Guido Grillenmeier
- The psychology of social engineering pp. 261-274

- Barry Coatesworth
- OTP bots and crypto: A tactic to disrupt pp. 275-284

- Kristen Spaeth
Volume 6, issue 2, 2022
- Editorial pp. 100-101

- Simon Beckett
- Social engineering and the use of persuasion to commit cyber fraud pp. 102-110

- Lance Wantenaar
- Threat intelligence meets risk management for operational resilience pp. 111-118

- Teresa T. Walsh
- Think beyond IT security — cyber resilience to build future-ready world: OT and ICS, critical infrastructure and beyond pp. 119-131

- Sanam Makadia
- The how and why of cyber security policy: Create behavioural and technical rules to mitigate risk pp. 132-140

- Jael Lewis and Cara E. Turbyfill
- Browser isolation as an enterprise security control pp. 141-147

- Henry Harrison
- Why deep learning holds the key to preventing cyberattacks before they can strike pp. 148-153

- Karen Crowley
- Exploring phronesis in cyber security, management and resilience pp. 154-167

- Mark Brett
- Mitigating challenges in an evolving cyber threat landscape pp. 168-177

- Benjamin Ang
- Malware development threats with modern technologies pp. 178-187

- Lawrence Amer
Volume 6, issue 1, 2022
- Editorial pp. 4-5

- Simon Beckett
- Securing decentralised organisations pp. 6-13

- Damir Rajnović
- Anomaly-based threat detection: Behavioural fingerprinting versus self-learning AI pp. 14-25

- Jeff Cornelius, Simon Fellows, Oakley Cox and Sam Lister
- A security concept for a global factory network: Practical considerations in implementation pp. 26-33

- Michael Voeth, Clare Patterson and Jannis Stemmann
- The insider threat to financial services: Why a shift in mindset is required to combat this silent risk pp. 34-40

- Dave Harvey
- Active Directory security: Why we fail and what auditors miss pp. 41-51

- Sylvain Cortes
- Integration versus convergence: A battle of the buzzwords? pp. 52-61

- Rodman Ramezanian
- The PIVO process for identifying vulnerabilities impact for organisation risks: An automated solution pp. 62-78

- Jean-Luc Simoni, Alexis Ulliac, Thomas Massip and Thomas Devaux
- Financial services security risks and remediations pp. 79-89

- Lior Arbel
- `Cybercrime through social engineering: The new global crisis` by Chris Kayser pp. 90-91

- Lance Wantenaar
| |