{"title":"Securing data on the move","authors":"Rick Vanover","doi":"10.12968/s1361-3723(24)70025-6","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70025-6","url":null,"abstract":"Organisations are not only moving much of their data to the cloud, many are adopting hybrid or multi-cloud models. This can result in a lot of data being on the move at any given time. But enabling that kind of data portability is not simple, especially when it comes to making sure it’s secure.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"10 17","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141397831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rethinking how you safeguard data","authors":"Mark Grindey","doi":"10.12968/s1361-3723(24)70022-0","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70022-0","url":null,"abstract":"The breach of 23andMe has highlighted the vulnerability of a cloud-only approach to data storage. One way that organisations can mitigate similar risks is by implementing on-premises and hybrid cloud solutions. These technologies can play a vital role in safeguarding organisational data, so long as you approach them in the right way.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"80 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141402684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Traditional fraud engines need to widen their view","authors":"Danny Kadyshevitch","doi":"10.12968/s1361-3723(24)70024-4","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70024-4","url":null,"abstract":"Most fraud detection systems are based on the frauds of the past. As criminals develop new and innovative ways of committing fraud, based on emerging technologies such as AI, those systems are lagging dangerously behind.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"78 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141412044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The AI vs AI showdown","authors":"Simon Horswell","doi":"10.12968/s1361-3723(24)70023-2","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70023-2","url":null,"abstract":"As we struggle to understand the real impact that AI is going to have on society, business and individual lives, we also need to work to put in place safeguards to shield us from malicious use of the technology. And while policies, laws and regulations all have their part to play, AI itself could be the answer to keeping AI in check.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"24 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141407574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How to harness AI securely in your business","authors":"Suid Adeyanju","doi":"10.12968/s1361-3723(24)70021-9","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70021-9","url":null,"abstract":"In the race to exploit AI solutions for competitive gain, too many organisations are ignoring the inherent security issues. In fact, a significant proportion are unaware that there are security issues. This is leading to high-risk situations about which firms remain dangerously ignorant. However, there are ways to reap the benefits of AI without exposing yourself to the risks.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"21 83","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141389701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing data retention with AI-assisted data management","authors":"Jon Fielding","doi":"10.12968/s1361-3723(24)70020-7","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70020-7","url":null,"abstract":"As data volumes grow exponentially, it's becoming an increasingly arduous task deciding what to keep and what to delete. Yet this is an essential task – not least for the sake of regulatory compliance. This is one more area where AI can significantly lighten the load.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"2006 15","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141027257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generative AI has democratised fraud and cybercrime","authors":"Danny Kadyshevitch","doi":"10.12968/s1361-3723(24)70018-9","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70018-9","url":null,"abstract":"Artificial intelligence has no intrinsic ethical stance. Everything depends on the uses to which it is put. This is leading to an arms race between threat actors, using generative AI and large language models (LLMs) to hone the effectiveness of phishing and other forms of attack, and security professionals looking to conscript AI into the effort to identify and interdict those attackers. What's certain is that no-one can ignore generative AI and LLMs, and it's important to understand both the threat and the potential for enhancing security.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"38 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141035654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The insider threat ‘zoo’","authors":"Karen Renaud, Merrill Warkentin","doi":"10.12968/s1361-3723(24)70019-0","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70019-0","url":null,"abstract":"The ‘insider threat’ is often discussed as though it is a single phenomenon. In fact, there are several species of threat and it's important to understand the differences between them. This article suggests a new taxonomy for insider threats and how to deal with them.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"54 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141043151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The recruitment wall in cyber security","authors":"Jamal Elmellas","doi":"10.12968/s1361-3723(24)70017-7","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70017-7","url":null,"abstract":"Organisations have been complaining for years about the cyber security skills gap, and the problem seems to be getting worse. However, many of the issues stem not from a lack of willing people but arbitrary barriers being placed in the way of those who would like to enter the field. We need more entry-level routes into cyber security, greater diversity and better support for training programmes.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"32 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141049445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strengthening digital safety for small businesses","authors":"Jen Brown","doi":"10.12968/s1361-3723(24)70009-8","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70009-8","url":null,"abstract":"Breaches at large organisations may grab the headlines, but attacks against small and medium-size businesses (SMBs) can be more frequent and more damaging. Although smaller firms may not have the budget to eliminate the threat entirely, this guide shows how effective use of the resources you have can significantly reduce the risks.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"49 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140398499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}