{"title":"Six steps to dealing with a ransomware attack","authors":"Chris Dimitriadis","doi":"10.12968/s1361-3723(23)70047-x","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70047-x","url":null,"abstract":"No organisation is safe from ransomware, and the threat it poses is only becoming more widespread and severe. However, there are ways to prepare yourself for an attack, and for dealing with the consequences once it occurs. Being ready can significantly reduce the impact when ransomware strikes.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessing cyber security coverage in non-computing disciplines","authors":"Steven Furnell, Eliana Stavrou","doi":"10.12968/s1361-3723(23)70048-1","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70048-1","url":null,"abstract":"Cyber security is now the concern and responsibility of everyone who uses technology, regardless of whether they are IT or security practitioners. And this needs to be reflected in education. There are many disciplines, not directly related to cyber security, where knowledge of the threats and the basic skills to combat them are becoming necessary if graduates are to fully contribute to a society safe from cyber risks.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The challenges of data sovereignty","authors":"Simon Pamplin","doi":"10.12968/s1361-3723(23)70049-3","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70049-3","url":null,"abstract":"Any companies still adopting a tech-first strategy for cyber security are entirely misunderstanding the intentions of global data protection regulation – and as a result are leaving both individuals and the business dangerously exposed. There are broader issues of data governance, including data sovereignty, that involve the whole of the organisation's management team.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136128930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving national security through accountability","authors":"Pieter Danhieux","doi":"10.12968/s1361-3723(23)70046-8","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70046-8","url":null,"abstract":"The cyber security of an organisation starts with the software it uses. And that places a responsibility on software vendors to ensure that the code they ship is intrinsically secure. And that security can't be added as an afterthought – it needs to be integrated deep into the development process.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"To get the best value out of data, you have to protect it","authors":"Jason Foster","doi":"10.12968/s1361-3723(23)70042-0","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70042-0","url":null,"abstract":"It has become a truism that data is the lifeblood of any modern organisation. But to reap the maximum value from data, you have to use it – and that makes it vulnerable. But this means you should view implementing an effective data security as a business investment – unlocking the potential of your data while keeping the organisation safe.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"373 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134916067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adding AI to NDR in the face of current threats","authors":"Jacques de la Rivière","doi":"10.12968/s1361-3723(23)70043-2","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70043-2","url":null,"abstract":"Threat actors exhibit highly agile behaviour, capable of evolving and adapting as new vulnerabilities become evident. Most organisations, however, don't have the same kind of flexibility and are constantly fighting last year's battles. Network detection and response (NDR) solutions have arisen to tackle this problem, and now with the added power of artificial intelligence they have the potential to give organisations the ability to react and respond quickly to new threats.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134916068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How providers can help SMBs navigate the rising tide of attacks","authors":"Darren Williams","doi":"10.12968/s1361-3723(23)70045-6","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70045-6","url":null,"abstract":"In the vast, ever-changing threat landscape that encompasses the cyber world, small-to-medium businesses (SMBs) find themselves in a particularly vulnerable position. The paradox of the digital economy is that while it opens unparalleled opportunities for SMBs, it also exposes them to a landscape of cyber security threats that are both complex and continually evolving.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134916065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Are we ready for the next WannaCry?","authors":"Mark Cunningham-Dickie","doi":"10.12968/s1361-3723(23)70041-9","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70041-9","url":null,"abstract":"The WannaCry and NotPetya attacks alerted the world to the massive disruption that can be caused by cyber attacks. They also highlighted weaknesses and a lack of investment in our defences. Since then, the threats we face have moved on, having become significantly more sophisticated not least due to the exploitation of artificial intelligence and machine learning. So are we ready for the next big attack?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134916362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The good and bad of generative AI","authors":"Bernard Montel","doi":"10.12968/s1361-3723(23)70044-4","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70044-4","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134916359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}