Network SecurityPub Date : 2024-06-01DOI: 10.12968/s1353-4858(24)70023-3
Monique Becenti
{"title":"Interconnection, NIS2 and the mobile device","authors":"Monique Becenti","doi":"10.12968/s1353-4858(24)70023-3","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70023-3","url":null,"abstract":"NIS2 will soon come into force all over the EU and – much like the GDPR – it threatens large fines for those that don’t comply. However, it may serve as a much-needed wake up call for those who are overlooking the fastest-growing part of their attack surface – the mobile device.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"198 S583","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141413566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Network SecurityPub Date : 2024-06-01DOI: 10.12968/s1353-4858(24)70026-9
Vincent Lomba
{"title":"Is new legislation the answer to curbing cybercrime?","authors":"Vincent Lomba","doi":"10.12968/s1353-4858(24)70026-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70026-9","url":null,"abstract":"Cyber attacks are on the increase, in terms of both the number of attacks and the damage they cause. Encouraging organisations to improve their cyber security has had only a limited effect. Now it’s the turn of legislation and regulation, with the Cyber Resilience Act (CRA) and Network and Information Security Directive (NIS2) coming into force in the EU. But what kind of impact are they likely to have?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"87 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141408782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Network SecurityPub Date : 2024-06-01DOI: 10.12968/s1353-4858(24)70024-5
Brendan Walsh
{"title":"Enhancing network resilience against growing cyberthreats","authors":"Brendan Walsh","doi":"10.12968/s1353-4858(24)70024-5","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70024-5","url":null,"abstract":"Networks are becoming ever-more complex, and people with the right skills to manage them securely are in desperately short supply. However, with the right network management environment – one that supports automation and operational efficiency – supported by relevant training, you can make your networks more resilient to current and future threats.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"43 24","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141403489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Network SecurityPub Date : 2024-06-01DOI: 10.12968/s1353-4858(24)70028-2
Chris Waynforth
{"title":"Cyber threats and key mitigation strategies","authors":"Chris Waynforth","doi":"10.12968/s1353-4858(24)70028-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70028-2","url":null,"abstract":"UK organisations – and perhaps most notably the National Health Service (NHS) – are the focus of serious overhauls in IT provision and strategy. But it seems that far too little of the effort and expense is geared towards security. While increased efficiency and productivity are important, any gains in those areas are doomed to be undermined if security is not an intrinsic part of IT improvement programmes.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"58 S8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141391156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Network SecurityPub Date : 2024-06-01DOI: 10.12968/s1353-4858(24)70025-7
Dominic Carroll
{"title":"Ensuring that cyber security is fit for the future of manufacturing","authors":"Dominic Carroll","doi":"10.12968/s1353-4858(24)70025-7","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70025-7","url":null,"abstract":"A cyber attack can have particularly devastating results on manufacturing organisations. More than half have turned to external providers to fully manage their security, while many more outsource at least some operations. But are the security service providers up to the task? And how can a manufacturer better align security with the organisation and its specific requirements?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"196 S567","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141413584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Network SecurityPub Date : 2024-05-01DOI: 10.12968/s1353-4858(24)70022-1
Ben Walker
{"title":"Minimising the risks and maximising the opportunities of generative AI","authors":"Ben Walker","doi":"10.12968/s1353-4858(24)70022-1","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70022-1","url":null,"abstract":"It's no secret that threat actors are enthusiastically adopting generative AI systems to help them launch more-effective cyber attacks. Fortunately, it's possible to fight AI with AI. There are new tools becoming available to help organisations protect their data and networks. But you need to know where to use them, when to use them and which are the most appropriate tools for each task.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"7 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141029340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Network SecurityPub Date : 2024-05-01DOI: 10.12968/s1353-4858(24)70020-8
Tomer Nahum, Eric Woodruff
{"title":"Forging identity in the cloud – dissecting Silver SAML","authors":"Tomer Nahum, Eric Woodruff","doi":"10.12968/s1353-4858(24)70020-8","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70020-8","url":null,"abstract":"An attack method used to forge identities by faking Security Assertion Markup Language (SAML) has been with us for years. But now threat actors have raised their game, targeting Microsoft's Entra ID service, which is extensively used by major cloud services.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"137 18","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141034262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Network SecurityPub Date : 2024-05-01DOI: 10.12968/s1353-4858(24)70019-1
Richard Menear
{"title":"Building a human firewall to keep your organisation secure","authors":"Richard Menear","doi":"10.12968/s1353-4858(24)70019-1","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70019-1","url":null,"abstract":"It's easy – perhaps too easy – to see cyber security as a technical issue. In fact, it's something that requires human effort from everyone within the organisation. It's something that needs to be baked in to every process, and every person needs to understand the risks and how to deal with them. This article look at the importance of positive cyber hygiene within businesses and how leaders can effectively create a culture of cyber security awareness.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"78 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141045624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Network SecurityPub Date : 2024-05-01DOI: 10.12968/s1353-4858(24)70018-x
Nils Gerhardt
{"title":"Putting cyber-safety first for Industry 4.0","authors":"Nils Gerhardt","doi":"10.12968/s1353-4858(24)70018-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70018-x","url":null,"abstract":"The adoption of the Industry 4.0 paradigm means embracing all the benefits that the most advanced technologies can bring. Yet manufacturing remains the most-attacked sector in cyber, and those same technologies could massively increase organisations’ threat surfaces, putting many of them at severe risk. It's essential that cyber security becomes an intrinsic part of any company's Industry 4.0 strategy.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"5 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141023682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}