Network SecurityPub Date : 2024-01-01DOI: 10.12968/s1353-4858(24)70002-6
Steve Mansfield-Devine
{"title":"Meeting the challenges of cyber security","authors":"Steve Mansfield-Devine","doi":"10.12968/s1353-4858(24)70002-6","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70002-6","url":null,"abstract":"Cyber security isn't getting any easier. Both the threats and the solutions designed to combat them are becoming ever more complex. Smaller firms frequently struggle to keep up with the latest threats and bring the right skills to bear. And even the largest firms face challenges when it comes to assessing risks and implementing the solutions to tackle them.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"254 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140521610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Network SecurityPub Date : 2023-11-01DOI: 10.12968/s1353-4858(23)70052-4
Paul Baird
{"title":"Improving risk management – combining security and cyber insurance practices","authors":"Paul Baird","doi":"10.12968/s1353-4858(23)70052-4","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70052-4","url":null,"abstract":"Cyber insurance will help you deal with the costs of recovering from a breach. But it can also play a deeper role. Insurance companies now demand that organisations demonstrate their security preparedness, and this means having a detailed and accurate picture of your infrastructure and IT estate. The tools you use to obtain this picture can also give you the insight you need to improve your readiness.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139292541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Network SecurityPub Date : 2023-11-01DOI: 10.12968/s1353-4858(23)70053-6
Graham Hosking
{"title":"How to assess the impact of generative artificial intelligence","authors":"Graham Hosking","doi":"10.12968/s1353-4858(23)70053-6","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70053-6","url":null,"abstract":"It's impossible to escape CHatGPT and other large language model AIs that are promising to disrupt everything from homework to hacking. Generative AI has a lot to offer organisations looking to find efficiencies in their business processes. But it has to be approached intelligently and with a full understanding of the potential security pitfalls, not least to your data security.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139305338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Network SecurityPub Date : 2023-11-01DOI: 10.12968/s1353-4858(23)70054-8
Mark Jow
{"title":"Encryption blind spots: shining a light on cloud network traffic","authors":"Mark Jow","doi":"10.12968/s1353-4858(23)70054-8","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70054-8","url":null,"abstract":"Monitoring for and detecting malicious activity on your networks is being made harder by the increasing volume of encrypted traffic. This encryption exists for good reasons, particularly when cloud services are in play, but threat actors are exploiting its inscrutability to gain access to networks and loiter for extended periods. However, extended Berkeley Packet Filter (eBPF) network analysis technology offers the possibility to gain full visibility into encrypted traffic across VM or container workloads.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139304953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Network SecurityPub Date : 2023-11-01DOI: 10.12968/s1353-4858(23)70055-x
Steve Kenny
{"title":"The NIS 2 Directive: securing critical assets","authors":"Steve Kenny","doi":"10.12968/s1353-4858(23)70055-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70055-x","url":null,"abstract":"The recently adopted NIS 2 Directive (NIS 2) directive and its UK counterpart will compel organisations in Europe that are involved with essential services to meet stringent requirements for security. But it's not only the companies themselves that need to ensure they understand and can meet these requirements: security firms that provide services to these kinds of customers also need to be on top of the regulations.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139303193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}