Cyber Security: A Peer-Reviewed Journal
2017 - 2025
From Henry Stewart Publications Bibliographic data for series maintained by Henry Stewart Talks (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 5, issue 4, 2022
- Editorial pp. 284-285

- Simon Beckett
- The new offensive cyber security: Strategically using asymmetrical tactics to promote information security pp. 286-293

- Christopher Ott
- How to stop attackers from owning your Active Directory pp. 294-302

- Carolyn Crandall and Tony Cole
- The imperative of enterprise-grade security for 5G pp. 303-315

- Leonid Burakovsky and Danielle Kriz
- How a well-thought-out incident response can take the advantage back from attackers pp. 316-323

- James Christiansen
- Focusing on the primary purpose: Protecting the attorney–client privilege and work product doctrine in incident response pp. 324-334

- Ashley Taylor, Ron Raether, Sadia Mirza, Sam Hatcher and Bonnie Gill
- A modern approach to cyber threat protection: The holy grail of cyber security departments? pp. 335-349

- Dariusz Trocyszyn and Adrian Korczyński
- Eliminating the blind spots: How to be accountable for an organisation’s overall security pp. 350-360

- Lorraine Dryland
- A principles-led approach to information assurance and governance in local government pp. 361-377

- Mark Brett
Volume 5, issue 3, 2022
- Editorial pp. 188-189

- Simon Beckett
- Tackling cybercrime and ransomware head-on: Disrupting criminal networks and protecting organisations pp. 190-205

- Marja Laitinen and Sarah Armstrong-Smith
- Paradigm of cyber security transformation in Lithuanian Railways during a pandemic pp. 206-215

- Antanas Kedys, Žaneta Navickienė and Rolandas Šlepetys
- Application security automation in development pp. 216-226

- Mike Kennedy, Chris Perkins, Maria Brown and Kori Prins
- Achieving least privilege at cloud scale with cloud infrastructure entitlements management pp. 227-236

- Maya Neelakandhan, Guruprasad Ramprakash and Mrudula Gaidhani
- Enabling cyber incident collaboration in UK local government through fast-time communication pp. 237-250

- Mark Brett
- How national CSIRTs leverage public data, OSINT and free tools in operational practices: An empirical study pp. 251-276

- Sharifah Roziah Binti Mohd Kassim, Shujun Li and Budi Arief
Volume 5, issue 2, 2021
- Editorial pp. 100-101

- Simon Beckett
- Digital contact tracing: Privacy versus efficiency pp. 102-112

- Ieva Ilves
- Improving threat detection with a detection development life cycle pp. 113-125

- Augusto Barros
- Maturing operational security with an automation-first approach to IAM pp. 126-134

- Bryan Christ
- Optimising cyber threat intelligence for your organisation pp. 135-141

- Christina Girtz
- Cyber security and data protection: Learning from your own mistakes is good, learning from somebody else’s mistakes is better — the reasons underpinning fines and what regulators expect of cyber security pp. 142-154

- Peter Craddock and Eline Van Bogget
- The high-performing low-risk mainframe: Reassess security in the context of changing operations to extinguish risk before it bursts out of control pp. 155-163

- Mary Ann Furno
- Security and safety incidents and standards pp. 164-176

- Robert Kemp and Richard Smith
Volume 5, issue 1, 2021
- Call for papers pp. 4-5

- Simon Beckett
- The human variable: Designing a security strategy for a future in flux pp. 6-12

- Gary Sorrentino
- Staying one step ahead of your adversaries: How to build a cyber threat intelligence team capable of delivering business value pp. 13-26

- Keith Nicholson
- Discovering CovidLock pp. 27-36

- Chad Anderson, Tarik Saleh and Sean M. Mcnee
- Scaling cyber physical systems throughout the organisation pp. 37-50

- Matt Leipnik
- Is ransomware winning? pp. 51-65

- Chris Goettl
- Home-grown machine learning implementation for a SIRT: A use case — detecting domain-generating algorithms pp. 66-79

- Brennan Lodge
- Zero trust computing through the application of information asset registers pp. 80-94

- Mark Brett
Volume 4, issue 4, 2021
- Editorial pp. 300-301

- Simon Beckett
- A framework for quantifying cyber security risks pp. 302-316

- Reinder Wolthuis, Frank Phillipson, Hidde-Jan Jongsma and Peter Langenkamp
- Open sesame: Lessons in password-based user authentication pp. 317-329

- Bahman Rashidi and Vaibhav Garg
- An overview of current issues and practice relating to local government cyber security in England and Wales pp. 330-344

- Mark Brett
- Cyber security for microreactors in advanced energy systems pp. 345-367

- Piyush Sabharwall, James Gibb, Christopher Ritter, Kathleen Araújo, Abhinav Gupta, Ian Ferguson, Bri Rolston, Ron Fisher, Jess Gehin and Youssef Ballout
- The laws governing data breaches: An update pp. 368-379

- Behnam Dayanim and Roya Butler
- Managing stakeholder communication during a cyber crisis pp. 380-387

- Caroline Sapriel
Volume 4, issue 3, 2021
- Editorial pp. 200-201

- Simon Beckett
- Risk is a result of human behaviour: Leveraging behavioural analytics to strengthen internal controls pp. 202-212

- Arvind Mehta
- Insider threat programmes: Time to hit restart pp. 213-222

- Jadee Hanson, Todd Thorsen and Nathan Hunstad
- The human problem behind credential theft and reuse pp. 223-231

- Erich Kron
- Know your suppliers: A review of ICT supply chain risk management efforts by the US government and its agencies pp. 232-242

- Olatunji Osunji
- International principles for boards of directors and cyber security pp. 243-250

- Larry Clinton
- Cyber security for smart cities: End-to-end cyber security strategy for IoT connected services pp. 251-266

- Moh Cissé
- Identifying cyber security risks in Spanish airports pp. 267-291

- Lázaro Florido-Benítez
Volume 4, issue 2, 2020
- Editorial pp. 100-101

- Simon Beckett
- The industrial Internet of Things: From preventive to reactive systems — redefining your cyber security game plan for the changing world pp. 102-110

- Lesley Kipling
- The complexity of performing cyber audits in the space sector along the supply chain pp. 111-121

- Jose Ramon Coz Fernandez and Vicente José Pastor Pérez
- Cheetahs, COVID-19 and the demand for crypto-agility pp. 122-134

- Michael Thelander
- Cyber leadership across a business ecosystem pp. 135-144

- Matthew Doan
- A framework for fostering a dynamic information security culture pp. 145-159

- Renay Carver
- Vulnerabilities on the wire: Mitigations for insecure ICS device communication pp. 160-181

- Michael Hoffman
- The landscape from above: Continuous cloud monitoring for continuous assurance pp. 182-193

- Fouad Khalil
Volume 4, issue 1, 2020
- Editorial pp. 4-5

- Simon Beckett
- Taking risk to the edge of acceptable pp. 6-13

- Steve Williamson
- Consider the consequences: Understanding and limiting physical impacts caused by an ICS cyberattack pp. 14-28

- Richard Wyman
- Effectively integrating physical security technology into the operational technology domain pp. 29-39

- Matthew Wharton
- Users are an intelligence source: Are you leveraging them in your detection strategy? pp. 40-47

- Tonia Dudley
- Think like a hacker: Reducing cyber security risk by improving API design and protection pp. 48-57

- Gerhard Giese
- The challenge of assessing strategic cyber security risk in organisations and critical infrastructure pp. 58-69

- Charles Harry
- What the market is not telling you about the cyber security skills shortage pp. 70-76

- Karla Reffold
- Non-traditional cyber adversaries: Combatting human trafficking through data science pp. 77-90

- Danielle Borrelli and Sherrie Caltagirone
| |