{"title":"Are we smart enough for smart technology?","authors":"Sareena Heer, S. Alghamdi, S. Furnell","doi":"10.12968/s1361-3723(23)70021-3","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70021-3","url":null,"abstract":"It's common to find any number of ‘smart’ devices in the modern home, with the most common being so-called smart speakers. Despite their huge popularity, people often view these devices with at least some degree of suspicion, with concerns about security and privacy. With this in mind, this article presents the details of a study conducted among current smart speaker users to examine their awareness and understanding of the security and privacy aspects of the devices that they are already using.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"163 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83146149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud as a malware infiltration channel","authors":"Raymond Canzanese","doi":"10.12968/s1361-3723(23)70016-x","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70016-x","url":null,"abstract":"It sometimes seems like everything is moving to the cloud, from the apps we use on our phones to major enterprise infrastructure. The result is that your IT landscape is always, to some extent, hybrid, with connections out to, and in from, the cloud at multiple points. The question you need to ask is whether this is opening up holes in your defences by exploiting channels and protocols that you inherently trust. This article examines the increasing popularity of cloud apps as a malware infiltration channel based on real-world data, and highlights potential mitigation strategies.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86535375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Squeezing the security budget","authors":"Steve Mansfield-Devine","doi":"10.12968/s1361-3723(23)70017-1","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70017-1","url":null,"abstract":"Organisations currently face huge economic pressures, and many of them are having to cut their budgets. But is cyber security really something you can afford to skimp on? And if savings have to be made, are there ways you can spend your security dollar more wisely?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"52 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85768436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developing a shared SOC","authors":"Martin Walsham","doi":"10.12968/s1361-3723(23)70019-5","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70019-5","url":null,"abstract":"A security operations centre (SOC) provides a critical security function to detect and defend from cyber security attacks. It is the last line of defence as part of an organisation's overall security control set. But not every organisation can, or should, run its own SOC.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"49 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91280434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Getting ahead of the attackers","authors":"D. Garcia","doi":"10.12968/s1361-3723(23)70011-0","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70011-0","url":null,"abstract":"Security is often reactive – responding to new forms of attack and trying to patch vulnerabilities before threat actors exploit them. It often seems difficult to get ahead of the curve, to secure the organisation in a considered and systematic way, rather than just firefighting the latest disaster.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"63 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80183692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Brace for an uptick in insider fraud","authors":"Omri Kletter","doi":"10.12968/s1361-3723(23)70012-2","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70012-2","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"71 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90618383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Why is zero trust so difficult?","authors":"Phil Robinson","doi":"10.12968/s1361-3723(23)70014-6","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70014-6","url":null,"abstract":"A zero-trust architecture offers significant security benefits and has become one of the most-discussed topics in information security. It's proven to offer high levels of breach prevention and has been shown to greatly reduce the costs of those organisations that are breached. So why is full adoption so slow, even among those organisations that have embraced the concept?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"69 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81135790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber insurance is no longer optional","authors":"M. Warren","doi":"10.12968/s1361-3723(23)70015-8","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70015-8","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82549084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Now is the time to invest in cyber","authors":"Miri Marciano","doi":"10.12968/s1361-3723(23)70013-4","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70013-4","url":null,"abstract":"Cyber threats are not new, but the scale of the attacks we're seeing and the damage they are causing is unprecedented. If you haven't already put in place cyber defences, your organisation is at risk and may be facing an existential threat. This means that everyone who has been putting off investing in information security solutions needs to reconsider – and quickly.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90235307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}