Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
The ISSA Journal

 

Contribute to the Journal:

Please contact the ISSA Journal Editor, and review in advance the Editorial Guidelines or the Open Forum Guidelines. Published authors may be eligible for CPE credits.

Have you ever considered writing for publication? Would you find it helpful to bounce your ideas and concepts off other members who have published? Would it be helpful to get feedback on your draft? The Editorial Advisory Board will pair you with an experienced author.

Advertise in the Journal: To learn about sponsorship opportunities, please contact Vendor Relations to request a Media Kit.

Meet the ISSA Journal Editorial Advisory Board.

Digital Archive for Members

Please click on the following journal issue links for access:
COMPUTER-Desktop/Laptop: Bluetoad | PDF; MOBILE-phone/tablet: iOS, Android ePub | Kindle Mobi



May 2015

Volume 13 - Issue 5

Feature articles include:

  • Working with Indicators of Compromise
  • Free/Open Source Forensics Tools
  • Wireshark
  • Software Supply Chain Management with BOMtotal
  • Using a Governance Tool
  • Starting with YARA the Automated Way
Members: please click on the following Journal issue links for access:
Computer: Bluetoad | PDF; Mobile: ePub | Mobi
Not a member? Read this month's feature article - Working with Indicators of Compromise - at no charge or Join Now and gain full access to the ISSA Journal.



April 2015

Volume 13 - Issue 4

Feature articles include:

  • The Militarization of Cyberspace: Implications for the Private Sector
  • Multi-Factor Authentication: What to Look For
  • Adding the How-To to the NIST Cybersecurity Framework
  • Formal Security Protocol Analysis
Members: please click on the following Journal issue links for access:
Computer: Bluetoad | PDF; Mobile: ePub | Mobi
Not a member? Read this month's feature article - The Militarization of Cyberspace: Implications for the Private Sector - at no charge or Join Now and gain full access to the ISSA Journal.



March 2015

Volume 13 - Issue 3

Feature articles include:

  • Troubling Trends of Espionage
  • Power to the Password
  • Why We Need to Know Physical Security
  • The Identity of Things: Privacy and Security Concerns
Members: please click on the following Journal issue links for access:
Computer: Bluetoad | PDF; Mobile: ePub | Mobi
Not a member? Read this month's feature article - Troubling Trends of Espionage - at no charge or Join Now and gain full access to the ISSA Journal.



February 2015

Volume 13 - Issue 2

Feature articles include:

  • Important Yet Overlooked Parts of Information Security
  • Secure Software-Defined Networks
  • Navigating and Interpreting the NIST Cybersecurity Framework
  • US Healthcare Transformation: Security and Privacy Challenges
Members: please click on the following Journal issue links for access:
Computer: Bluetoad | PDF; Mobile: ePub | Mobi

 

Not a member? Read this month's feature article - Important Yet Overlooked Parts of Information Security - at no charge or Join Now and gain full access to the ISSA Journal.



January 2015

Volume 13 - Issue 1

Feature articles include:

  • The Cyberbuck Stops Here! What Every Board Member Should Know about His or Her Cybersecurity Fiduciary Duties
  • Takedown Denied: Unorthodox Tactics in Response to the iCloud Hack
  • Sharing Cyber Threat Information: A Legal Perspective
  • Hacking Back in Self Defense: The Methodology of Active Defense
  • The Internet of Things and Liability
Members: please click on the following Journal issue links for access:
PDF
| BlueToad | ePub | Mobi
Not a member? Read this month's feature article - The Cyberbuck Stops Here! What Every Board Member Should Know about His or Her Cybersecurity Fiduciary Duties - at no charge or Join Now and gain full access to the ISSA Journal.



December 2014

Volume 12 - Issue 12

Feature articles include:

  • The Complexity Paradox
  • Roles of Reverse Engineering in Combating Advanced Attacks
  • Cybersecurity Protects Your Company’s Valuable Trade Secrets
  • Information Valuation and Risk Management
  • Cloud Services Compliance Data Standard
Members: please click on the following Journal issue links for access:
PDF
| BlueToad | ePub | Mobi
Not a member? Read this month's feature article - The Complexity Paradox - at no charge or Join Now and gain full access to the ISSA Journal.



November 2014

Volume 12 - Issue 11

Feature articles include:

  • International Conference Highlights
  • Think Like Your Adversary: Leveraging the Cyber Threat Kill Chain
  • Thoughts on Managed Security Services Provider Engagement
  • The Militarization of Cyberspace: Implications for the Private Sector
  • Compliance Concerns with Password Compromises
Members: please click on the following Journal issue links for access:
PDF
| BlueToad | ePub | Mobi
Not a member? Read this month's feature article - Think Like Your Adversary: Leveraging the Cyber Threat Kill Chain - at no charge or Join Now and gain full access to the ISSA Journal.



October 2014

Volume 12 - Issue 10

Feature articles include:

  • Turning the Tables on Antivirus
  • How Business Process Management Can Facilitate Adaptive Data Protection
  • Challenges to Centralized Monitoring for Cybersecurity
  • ISSA International Conference Guide
Members: please click on the following Journal issue links for access:
PDF
| BlueToad | ePub | Mobi
Not a member? Read this month's feature article - Turning the Tables on Antivirus - at no charge or Join Now and gain full access to the ISSA Journal.



September 2014

Volume 12 - Issue 9

Feature articles include:

  • Medical Device Security: A Biomedical Engineering Professional’s Perspective
  • The Complexity Paradox
  • Web Services Security for All
  • ISSA International Conference Guide
Members: please click on the following Journal issue links for access:
PDF
| BlueToad | ePub | Mobi
Not a member? Read this month's feature article - Medical Device Security: A Biomedical Engineering Professional’s Perspective - at no charge or Join Now and gain full access to the ISSA Journal.


August 2014

Volume 12 - Issue 8

Feature articles include:

  • Optimizing Security Operations for the Big Data Crush
  • The Fourth V: Vigilance
  • Big Data, Security, and Privacy: Concepts and Applicability
  • Towards a Big Data Behavioral Analytics Platform
  • Information Valuation and Risk Management
  • ISSA International Conference Guide
Members: please click on the following Journal issue links for access:
PDF
| BlueToad | ePub | Mobi
Not a member? Read this month's feature article - Optimizing Security Operations for the Big Data Crush - at no charge or Join Now and gain full access to the ISSA Journal.



July 2014

Volume 12 - Issue 7

Feature articles include:

  • Practical Use of Infosec Tools
  • Digital Evidence Acquisition Using Cyberforensics Tools
  • Practical Defense-in-Depth Protection against Botnets
  • A Call to Protect Personally Identifiable Information
Members: please click on the following Journal issue links for access:
PDF
| BlueToad | ePub | Mobi
Not a member? Read this month's feature article - Practical Use of Infosec Tools - at no charge or Join Now and gain full access to the ISSA Journal.



June 2014

Volume 12 - Issue 6

Feature articles include:

  • 2014 International Election Candidate Profiles
  • Identity and Access Management 2020
  • Payment Card Breaches: Time to Spread the Risk with Mandatory Cyber Insurance
  • Mobile Security Banking and Payments Standard
  • Perception of Ethical Misbehavior: A Case Study Assessing IT/IS Student Opinion
Members: please click on the following Journal issue links for access:
PDF
| BlueToad | ePub | Mobi
Not a member? Read this month's feature article - Identity and Access Management 2020 - at no charge or Join Now and gain full access to the ISSA Journal.


 

Community Search
Sign In


Forgot your password?

Haven't registered yet?

Calendar

5/27/2015 » 5/28/2015
SecureWorld Atlanta

6/4/2015 » 6/5/2015
The Seventh Annual Information Security Summit

6/8/2015
ISSA WIS SIG Webinar: Networking for Professional Growth: Reaching Outside of Your Comfort Zone

6/12/2015
ISSA Financial SIG Webinar: FFIEC Cybersecurity Assessment




Copyright © 2012, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information