{"title":"The importance of security for the crypto industry","authors":"Marc Wilczek","doi":"10.12968/s1361-3723(22)70596-9","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70596-9","url":null,"abstract":"Cyber attacks are becoming an increasingly important issue in the financial industry. The recent shutdown of the darknet marketplace ‘Hydra Markets’ in April 2022, firmly established cyberthreats as a critical topic within the world of finance. Hydra was a platform that had generated a revenue of €1.2bn by 2020 from illegal business on the Internet. So how strongly is the sensitive environment of the crypto industry affected by cyber attacks, especially DDoS?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78500585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The changing role of the chief compliance officer","authors":"S. Winchester","doi":"10.12968/s1361-3723(22)70597-0","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70597-0","url":null,"abstract":"Organisations are constantly challenged to reassess their position in the ever-changing business landscape. As this landscape changes, it arguably has the greatest impact on the role of the chief compliance officer, with the CCO playing an ever more crucial part in navigating the issues raised as a result of functional and operational challenges. Whether it's responding to the additional risks brought on by the pandemic, developing an approach to technology and data analytics that complies with ever-changing regulatory standards, or overseeing a remote or decentralised workforce, this all becomes a priority for the CCO. Amidst this backdrop, CCOs must be adaptable in order to take on a range of responsibilities.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"129 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89613005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using AI to combat fraud in the voice channel","authors":"Amit Gupta","doi":"10.12968/s1361-3723(22)70590-8","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70590-8","url":null,"abstract":"Whether it's an attempt to defraud individuals by accessing their bank accounts, or a large-scale attack on an organisation targeting huge volumes of data, identity is at the heart of most sophisticated criminal activity today. And while most online channels have been continually strengthened to stay ahead of evolving criminal tactics, the voice channel – another critical customer connection point – has increasingly come to be seen as a vulnerable target.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"55 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76546679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Are cyber security breaches unavoidable?","authors":"Paul O'Rourke","doi":"10.12968/s1361-3723(22)70591-x","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70591-x","url":null,"abstract":"The increased likelihood of a security breach is a natural consequence of the widespread availability of an organisation's IT systems and data via digital and mobile technologies. Criminals look for the weakest link in the chain of security, whether it be through applications, an increased number of portal entry points, or an employee who is unaware of the potential danger. So are we at the point where a breach is inevitable?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"67 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86013622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Uncovering data relationships to tackle fraud","authors":"A. Frame","doi":"10.12968/s1361-3723(22)70588-x","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70588-x","url":null,"abstract":"Graph technology has reached a point of maturity where it can run off-the-shelf algorithms over massive networks to discover previously undetectable patterns. These algorithms also permit security professionals to take the necessary actions to render systems more robust and secure. As a result, financial and government institutions are making increasing use of graph database technology to tackle fraud.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"426 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77131291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SASE and the future of IoT security","authors":"Martin Giess","doi":"10.12968/s1361-3723(22)70589-1","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70589-1","url":null,"abstract":"Secure Access Service Edge (SASE) is starting to become mainstream. And this approach promises unified policies that improve agility, fortify security and simplify the network stack – especially when it comes to the Internet of Things (IoT).","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83025193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How to maintain control in a regulated environment","authors":"Mat Clothier","doi":"10.12968/s1361-3723(22)70584-2","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70584-2","url":null,"abstract":"From banking to healthcare and pharmaceuticals, a variety of industries are finding themselves subject to ever-multiplying regulations and rules that they must comply with to avoid sanctions and penalties. And the continual accumulation of regulatory changes and updates can leave some organisations struggling to keep pace.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77599421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The growing need for digital document attestation","authors":"M. Sahib","doi":"10.12968/s1361-3723(22)70585-4","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70585-4","url":null,"abstract":"Advancing technology and the Covid-19 pandemic have prompted a rise in digital transactions. More sales, contracts and legal agreements have moved online than ever before and that number is only growing. But accompanying this is a rising concern about the security of digital documents, and particularly the robustness of digital document attestation.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88697442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}