1

Open banking: opportunity and danger

Year:
2016
Language:
english
File:
PDF, 1.45 MB
english, 2016
3

Data governance: going beyond compliance

Year:
2017
Language:
english
File:
PDF, 557 KB
english, 2017
4

The imitation game: how business email compromise scams are robbing organisations

Year:
2016
Language:
english
File:
PDF, 1.35 MB
english, 2016
5

Ransomware: taking businesses hostage

Year:
2016
Language:
english
File:
PDF, 4.49 MB
english, 2016
7

Fileless attacks: compromising targets without malware

Year:
2017
Language:
english
File:
PDF, 725 KB
english, 2017
8

A process of defence – securing industrial control systems

Year:
2017
Language:
english
File:
PDF, 2.19 MB
english, 2017
9

DevOps: finding room for security

Year:
2018
Language:
english
File:
PDF, 1.93 MB
english, 2018
10

Creating security operations centres that work

Year:
2016
Language:
english
File:
PDF, 588 KB
english, 2016
11

Ransomware: the most popular form of attack

Year:
2017
Language:
english
File:
PDF, 1.66 MB
english, 2017
12

Hacking democracy: abusing the Internet for political gain

Year:
2018
Language:
english
File:
PDF, 1.34 MB
english, 2018
13

The Ashley Madison affair

Year:
2015
Language:
english
File:
PDF, 3.04 MB
english, 2015
14

The malware arms race

Year:
2018
Language:
english
File:
PDF, 1.80 MB
english, 2018
15

Nation-state hacking – a threat to everyone

Year:
2018
Language:
english
File:
PDF, 753 KB
english, 2018
16

Rating the risk: how to assess the dangers of working with other organisations

Year:
2019
Language:
english
File:
PDF, 541 KB
english, 2019
17

Google hacking 101

Year:
2009
Language:
english
File:
PDF, 125 KB
english, 2009
18

Darknets

Year:
2009
Language:
english
File:
PDF, 117 KB
english, 2009
19

Tor under attack

Year:
2014
Language:
english
File:
PDF, 1.34 MB
english, 2014
21

Identity crisis: the disconnect between business and IT executives

Year:
2018
Language:
english
File:
PDF, 1.51 MB
english, 2018
24

Anti-social networking: exploiting the trusting environment of Web 2.0

Year:
2008
Language:
english
File:
PDF, 139 KB
english, 2008
25

Mycophenolate mofetil in pediatric renal transplantation

Year:
1999
Language:
english
File:
PDF, 186 KB
english, 1999
28

Biometrics at war: the US military's need for identification and authentication

Year:
2012
Language:
english
File:
PDF, 559 KB
english, 2012
29

Hacktivism: assessing the damage

Year:
2011
Language:
english
File:
PDF, 1.08 MB
english, 2011
30

DDoS: threats and mitigation

Year:
2011
Language:
english
File:
PDF, 636 KB
english, 2011
31

Hacking the hackers

Year:
2009
Language:
english
File:
PDF, 269 KB
english, 2009
32

Security through isolation

Year:
2010
Language:
english
File:
PDF, 271 KB
english, 2010
33

Significant rise in cybercrime against public sector organisations

Year:
2012
Language:
english
File:
PDF, 161 KB
english, 2012
34

Interview: Philip Lieberman and the human factor

Year:
2012
Language:
english
File:
PDF, 285 KB
english, 2012
35

Estonia: what doesn't kill you makes you stronger

Year:
2012
Language:
english
File:
PDF, 1.67 MB
english, 2012
36

Paranoid Android: just how insecure is the most popular mobile platform?

Year:
2012
Language:
english
File:
PDF, 668 KB
english, 2012
37

Social identity: is biometric technology on social networks a benefit or a threat?

Year:
2012
Language:
english
File:
PDF, 696 KB
english, 2012
38

Ian Glover, CREST – a professional approach to information assurance

Year:
2013
Language:
english
File:
PDF, 467 KB
english, 2013
39

An added dimension: 3D face recognition

Year:
2013
Language:
english
File:
PDF, 1.06 MB
english, 2013
40

Interview: Joe Ferrara – fighting phishing

Year:
2013
Language:
english
File:
PDF, 767 KB
english, 2013
41

Interview: Corey Nachreiner, WatchGuard – security visibility

Year:
2014
Language:
english
File:
PDF, 1.14 MB
english, 2014
42

A return on your security investment

Year:
2014
Language:
english
File:
PDF, 350 KB
english, 2014
43

The dark side of advertising

Year:
2014
Language:
english
File:
PDF, 906 KB
english, 2014
44

Mobile security: it's all about behaviour

Year:
2014
Language:
english
File:
PDF, 488 KB
english, 2014
45

The growth and evolution of DDoS

Year:
2015
Language:
english
File:
PDF, 1.93 MB
english, 2015
47

Hiring ethical hackers: the search for the right kinds of skills

Year:
2017
Language:
english
File:
PDF, 2.51 MB
english, 2017
48

Threat hunting: assuming the worst to strengthen resilience

Year:
2017
Language:
english
File:
PDF, 527 KB
english, 2017
49

Leaks and ransoms – the key threats to healthcare organisations

Year:
2017
Language:
english
File:
PDF, 1.76 MB
english, 2017
50

Weaponising the Internet of Things

Year:
2017
Language:
english
File:
PDF, 2.15 MB
english, 2017