EconPapers    
Economics at your fingertips  
 

Cyber Security: A Peer-Reviewed Journal

2017 - 2025

From Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 6, issue 4, 2023

Editorial pp. 292-293 Downloads
Simon Beckett
How CISOs can truly align with the business pp. 294-300 Downloads
Candy Alexander
Machine learning or behaviour heuristics? The synergy of approaches to defeat advanced ransomware threats pp. 301-310 Downloads
Vladimir Strogov and Sergey Ulasen
The curse of knowledge can damage awareness programmes: Here's how to defeat it pp. 311-319 Downloads
Kerry Tomlinson
Privacy threats and vulnerabilities: Reinvent your privacy engineering practices and win pp. 320-333 Downloads
Smitha Sriharsha
Analysis of software bill of materials tools pp. 334-355 Downloads
Arushi Arora and Christina Garman
The human side of cybercrime pp. 356-365 Downloads
Kylie Watson and Tayla Payne
A strong story to tell: Top ten mistakes by administrators pp. 366-372 Downloads
Paula Januszkiewicz
An approach to establishing a multi-organisational public sector security operations centre pp. 373-383 Downloads
Mark Brett

Volume 6, issue 3, 2023

Editorial pp. 196-197 Downloads
Simon Beckett
Building a high-performing data ethics programme from the ground up pp. 198-210 Downloads
Alexandra Ross, Ilana Golbin and Bret S. Cohen
Dangers of succumbing to bias in cyber security: An evaluation of the impact of cognitive biases on threat assessments and cyber security strategies pp. 211-219 Downloads
Hanah-Marie Darley
The Zoom effect: A framework for security programme transformation pp. 220-229 Downloads
Heather Ceylan and Ariel Chavan
Users are not stupid: Six cyber security pitfalls overturned pp. 230-241 Downloads
Julie Haney
Improving your Active Directory security posture: AdminSDHolder to the rescue pp. 242-260 Downloads
Guido Grillenmeier
The psychology of social engineering pp. 261-274 Downloads
Barry Coatesworth
OTP bots and crypto: A tactic to disrupt pp. 275-284 Downloads
Kristen Spaeth

Volume 6, issue 2, 2022

Editorial pp. 100-101 Downloads
Simon Beckett
Social engineering and the use of persuasion to commit cyber fraud pp. 102-110 Downloads
Lance Wantenaar
Threat intelligence meets risk management for operational resilience pp. 111-118 Downloads
Teresa T. Walsh
Think beyond IT security — cyber resilience to build future-ready world: OT and ICS, critical infrastructure and beyond pp. 119-131 Downloads
Sanam Makadia
The how and why of cyber security policy: Create behavioural and technical rules to mitigate risk pp. 132-140 Downloads
Jael Lewis and Cara E. Turbyfill
Browser isolation as an enterprise security control pp. 141-147 Downloads
Henry Harrison
Why deep learning holds the key to preventing cyberattacks before they can strike pp. 148-153 Downloads
Karen Crowley
Exploring phronesis in cyber security, management and resilience pp. 154-167 Downloads
Mark Brett
Mitigating challenges in an evolving cyber threat landscape pp. 168-177 Downloads
Benjamin Ang
Malware development threats with modern technologies pp. 178-187 Downloads
Lawrence Amer

Volume 6, issue 1, 2022

Editorial pp. 4-5 Downloads
Simon Beckett
Securing decentralised organisations pp. 6-13 Downloads
Damir Rajnović
Anomaly-based threat detection: Behavioural fingerprinting versus self-learning AI pp. 14-25 Downloads
Jeff Cornelius, Simon Fellows, Oakley Cox and Sam Lister
A security concept for a global factory network: Practical considerations in implementation pp. 26-33 Downloads
Michael Voeth, Clare Patterson and Jannis Stemmann
The insider threat to financial services: Why a shift in mindset is required to combat this silent risk pp. 34-40 Downloads
Dave Harvey
Active Directory security: Why we fail and what auditors miss pp. 41-51 Downloads
Sylvain Cortes
Integration versus convergence: A battle of the buzzwords? pp. 52-61 Downloads
Rodman Ramezanian
The PIVO process for identifying vulnerabilities impact for organisation risks: An automated solution pp. 62-78 Downloads
Jean-Luc Simoni, Alexis Ulliac, Thomas Massip and Thomas Devaux
Financial services security risks and remediations pp. 79-89 Downloads
Lior Arbel
`Cybercrime through social engineering: The new global crisis` by Chris Kayser pp. 90-91 Downloads
Lance Wantenaar

Volume 5, issue 4, 2022

Editorial pp. 284-285 Downloads
Simon Beckett
The new offensive cyber security: Strategically using asymmetrical tactics to promote information security pp. 286-293 Downloads
Christopher Ott
How to stop attackers from owning your Active Directory pp. 294-302 Downloads
Carolyn Crandall and Tony Cole
The imperative of enterprise-grade security for 5G pp. 303-315 Downloads
Leonid Burakovsky and Danielle Kriz
How a well-thought-out incident response can take the advantage back from attackers pp. 316-323 Downloads
James Christiansen
Focusing on the primary purpose: Protecting the attorney–client privilege and work product doctrine in incident response pp. 324-334 Downloads
Ashley Taylor, Ron Raether, Sadia Mirza, Sam Hatcher and Bonnie Gill
A modern approach to cyber threat protection: The holy grail of cyber security departments? pp. 335-349 Downloads
Dariusz Trocyszyn and Adrian Korczyński
Eliminating the blind spots: How to be accountable for an organisation’s overall security pp. 350-360 Downloads
Lorraine Dryland
A principles-led approach to information assurance and governance in local government pp. 361-377 Downloads
Mark Brett

Volume 5, issue 3, 2022

Editorial pp. 188-189 Downloads
Simon Beckett
Tackling cybercrime and ransomware head-on: Disrupting criminal networks and protecting organisations pp. 190-205 Downloads
Marja Laitinen and Sarah Armstrong-Smith
Paradigm of cyber security transformation in Lithuanian Railways during a pandemic pp. 206-215 Downloads
Antanas Kedys, Žaneta Navickienė and Rolandas Šlepetys
Application security automation in development pp. 216-226 Downloads
Mike Kennedy, Chris Perkins, Maria Brown and Kori Prins
Achieving least privilege at cloud scale with cloud infrastructure entitlements management pp. 227-236 Downloads
Maya Neelakandhan, Guruprasad Ramprakash and Mrudula Gaidhani
Enabling cyber incident collaboration in UK local government through fast-time communication pp. 237-250 Downloads
Mark Brett
How national CSIRTs leverage public data, OSINT and free tools in operational practices: An empirical study pp. 251-276 Downloads
Sharifah Roziah Binti Mohd Kassim, Shujun Li and Budi Arief

Volume 5, issue 2, 2021

Editorial pp. 100-101 Downloads
Simon Beckett
Digital contact tracing: Privacy versus efficiency pp. 102-112 Downloads
Ieva Ilves
Improving threat detection with a detection development life cycle pp. 113-125 Downloads
Augusto Barros
Maturing operational security with an automation-first approach to IAM pp. 126-134 Downloads
Bryan Christ
Optimising cyber threat intelligence for your organisation pp. 135-141 Downloads
Christina Girtz
Cyber security and data protection: Learning from your own mistakes is good, learning from somebody else’s mistakes is better — the reasons underpinning fines and what regulators expect of cyber security pp. 142-154 Downloads
Peter Craddock and Eline Van Bogget
The high-performing low-risk mainframe: Reassess security in the context of changing operations to extinguish risk before it bursts out of control pp. 155-163 Downloads
Mary Ann Furno
Security and safety incidents and standards pp. 164-176 Downloads
Robert Kemp and Richard Smith

Volume 5, issue 1, 2021

Call for papers pp. 4-5 Downloads
Simon Beckett
The human variable: Designing a security strategy for a future in flux pp. 6-12 Downloads
Gary Sorrentino
Staying one step ahead of your adversaries: How to build a cyber threat intelligence team capable of delivering business value pp. 13-26 Downloads
Keith Nicholson
Discovering CovidLock pp. 27-36 Downloads
Chad Anderson, Tarik Saleh and Sean M. Mcnee
Scaling cyber physical systems throughout the organisation pp. 37-50 Downloads
Matt Leipnik
Is ransomware winning? pp. 51-65 Downloads
Chris Goettl
Home-grown machine learning implementation for a SIRT: A use case — detecting domain-generating algorithms pp. 66-79 Downloads
Brennan Lodge
Zero trust computing through the application of information asset registers pp. 80-94 Downloads
Mark Brett
Page updated 2025-04-21