Network Security最新文献

筛选
英文 中文
Secure and resilient remote access is what really matters 安全且有弹性的远程访问才是真正重要的
Network Security Pub Date : 2023-04-01 DOI: 10.12968/s1353-4858(23)70015-9
Alan Stewart-Brown
{"title":"Secure and resilient remote access is what really matters","authors":"Alan Stewart-Brown","doi":"10.12968/s1353-4858(23)70015-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70015-9","url":null,"abstract":"Forget the ‘edge vs cloud’ debate. These technologies each have their place, but they are both vulnerable to certain kinds of threats. And it is these risks that should be front of mind – especially for organisations adapting to new kinds of working.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"102 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86031546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tackling new and emerging threats 应对新出现的威胁
Network Security Pub Date : 2023-04-01 DOI: 10.12968/s1353-4858(23)70018-4
J. Pescatore
{"title":"Tackling new and emerging threats","authors":"J. Pescatore","doi":"10.12968/s1353-4858(23)70018-4","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70018-4","url":null,"abstract":"The threat landscape is never static. If you are to stay one jump ahead of attackers, you need to evolve your defences – with threat awareness and education being among our most important defences.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"118 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82487949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The right balance between controls and teams 控制和团队之间的适当平衡
Network Security Pub Date : 2023-04-01 DOI: 10.12968/s1353-4858(23)70016-0
Gemma Moore
{"title":"The right balance between controls and teams","authors":"Gemma Moore","doi":"10.12968/s1353-4858(23)70016-0","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70016-0","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79838898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Do you have too much security? 你有太多的安全措施吗?
Network Security Pub Date : 2023-03-01 DOI: 10.12968/s1353-4858(23)70013-5
Steve Mansfield-Devine
{"title":"Do you have too much security?","authors":"Steve Mansfield-Devine","doi":"10.12968/s1353-4858(23)70013-5","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70013-5","url":null,"abstract":"Organisations seem to accumulate cyber security solutions, to the point where they become difficult to use and it becomes impossible to ensure that they are operating efficiently. The result can be unnecessary and expensive duplication as well as unseen gaps that leave you vulnerable to attack.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"43 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73308722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Is ChatGPT really a cyberthreat? ChatGPT真的是网络威胁吗?
Network Security Pub Date : 2023-03-01 DOI: 10.12968/s1353-4858(23)70014-7
Thomas B. McVey
{"title":"Is ChatGPT really a cyberthreat?","authors":"Thomas B. McVey","doi":"10.12968/s1353-4858(23)70014-7","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70014-7","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78791647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NewsPenguin threatens Pakistan 巴布亚新几内亚威胁巴基斯坦
Network Security Pub Date : 2023-03-01 DOI: 10.12968/s1353-4858(23)70012-3
Dmitry Bestuzhev
{"title":"NewsPenguin threatens Pakistan","authors":"Dmitry Bestuzhev","doi":"10.12968/s1353-4858(23)70012-3","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70012-3","url":null,"abstract":"NewsPenguin is a previously unknown threat actor, targeting Pakistan with an advanced espionage tool. The group's campaign seemed to be geared to targeting visitors to a major trade show. However, an analysis of its techniques and technologies throws some interesting light on how targeted attacks are being deployed.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76240532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preparing for crisis: are you ready to be attacked? 为危机做准备:你准备好被攻击了吗?
Network Security Pub Date : 2023-02-01 DOI: 10.12968/s1353-4858(23)70009-3
Luke Kenny
{"title":"Preparing for crisis: are you ready to be attacked?","authors":"Luke Kenny","doi":"10.12968/s1353-4858(23)70009-3","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70009-3","url":null,"abstract":"How can you tell if your organisation is really prepared for a cyber attack? Focusing too heavily on technological solutions can result in key aspects being overlooked – including the necessary skills and awareness among your staff and whether you have the right processes in place, and the people ready and prepared to use them, in case of an attack.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"62 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86042679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The nightmare of hard-coded credentials 硬编码凭证的噩梦
Network Security Pub Date : 2023-02-01 DOI: 10.12968/s1353-4858(23)70010-x
Thomas Segura
{"title":"The nightmare of hard-coded credentials","authors":"Thomas Segura","doi":"10.12968/s1353-4858(23)70010-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70010-x","url":null,"abstract":"With increasing threats from cybercrime and state-sponsored actors around the world, companies need to focus their defence resources on elements that can most cost-effectively reduce their security debt and advance their DevSecOps maturity. Detecting hard-coded secrets in source code is a preventive tactic that greatly increases the cost to the attacker by removing the low-hanging fruits first. But this requires a strategic approach to preserve application security teams’ operational capacity.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"216 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77120765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Guilty of hiding a data breach 隐瞒数据泄露的罪名成立
Network Security Pub Date : 2023-02-01 DOI: 10.12968/s1353-4858(23)70008-1
Nigel Jones
{"title":"Guilty of hiding a data breach","authors":"Nigel Jones","doi":"10.12968/s1353-4858(23)70008-1","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70008-1","url":null,"abstract":"What does the criminal conviction of Uber's former CISO mean for the information security sector? The case highlights the need for CISOs to ensure that they have a clear line to the board, and a robust plan for how to deal with security incidents ahead of time.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81272571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PKI – friend or foe? PKI是敌是友?
Network Security Pub Date : 2023-02-01 DOI: 10.12968/s1353-4858(23)70007-x
C. Tankard
{"title":"PKI – friend or foe?","authors":"C. Tankard","doi":"10.12968/s1353-4858(23)70007-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70007-x","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"527 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86907430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信