Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
The ISSA Journal

 

Contribute to the Journal:

Please contact the ISSA Journal Editor, and review in advance the Editorial Guidelines or the Open Forum Guidelines. Include the copyright release and submission checklist with your article. Published authors may be eligible for CPE credits.

Have you ever considered writing for publication? Would you find it helpful to bounce your ideas and concepts off other members who have published? Would it be helpful to get feedback on your draft? The Editorial Advisory Board will pair you with an experienced author. Sign up at Friends of Authors.

Advertise in the Journal: To learn about sponsorship opportunities, please contact Vendor Relations to request a Media Kit.

Meet the ISSA Journal Editorial Advisory Board.

Digital Archive for Members

Please click on the following journal issue links for access:
COMPUTER-Desktop/Laptop: Bluetoad | PDF; MOBILE-phone/tablet: iOS, Android ePub | Kindle Mobi



February 2016

Volume 14 - Issue 2

Feature articles include:

  • Protecting Your Data against Cyber Attacks in Big Data Environments - Reiner Kappenberger
  • Using Data Breach Reports to Assess Risk Analysis Quality - Jack Freund, Stephen Fritts, and Joan Marius
  • Security’s Seat at the Big Data Table - Tony Rice
  • Why Information Security Teams Fail - Jason Lang
  • Securing Data to Prevent Data Theft - Barry Stetler
Members: please click on the following Journal issue links for access:
Computer: Bluetoad | PDF; Mobile: ePub | Mobi
Not a member? Read this month's feature article - Protecting Your Data against Cyber Attacks in Big Data Environments - at no charge or Join Now and gain full access to the ISSA Journal.



January 2016

Volume 14 - Issue 1

Feature articles include:

  • Promoting Public Cloud Workload Security: Legal and Technical Aspects by Jason Paul Kazarian
  • Gaining Confidence in the Cloud by Phillip Griffin and Jeff Stapleton
  • Why Risk Management Is Hard by Luther Martin and Amy Vosters
  • Securing the Cloud by Barettè Mort
Members: please click on the following Journal issue links for access:
Computer: Bluetoad | PDF; Mobile: ePub | Mobi
Not a member? Read this month's feature article - Promoting Public Cloud Workload Security: Legal and Technical Aspects - at no charge or Join Now and gain full access to the ISSA Journal.



December 2015

Volume 13 - Issue 12

Feature articles include:

  • Troubling Trends of Espionage
  • Malware and How to Deal with It
  • Information Security, Privacy, and the Law in Crisis Organizations
  • Improving Cybersecurity Workforce Capacity and Capability: Addressing the Education-to-Workforce Disparity
  • 2015 International Conference Report - Day 2
Members: please click on the following Journal issue links for access:
Computer: Bluetoad | PDF; Mobile: ePub | Mobi
Not a member? Read this month's feature article - Troubling Trends of Espionage - at no charge or Join Now and gain full access to the ISSA Journal.



November 2015

Volume 13 - Issue 11

Feature articles include:

  • Some Comments on Next Generation Mass Surveillance Architecture
  • Help Your Users Protect against Family Member Fraud
  • Do This, Not That: Career Advice from Top Infosec Professional Leaders
  • Defensive Use of Social Media
  • 2015 International Conference Report
Members: please click on the following Journal issue links for access:
Computer: Bluetoad | PDF; Mobile: ePub | Mobi
Not a member? Read this month's feature article - Some Comments on Next Generation Mass Surveillance Architecture - at no charge or Join Now and gain full access to the ISSA Journal.



October 2015

Volume 13 - Issue 10

Feature articles include:

  • Improving Cybersecurity Workforce Capacity and Capability: Addressing the Education-to-Workforce Disparity
  • Planning for a Career in the Department of Defense Cybersecurity Workforce
  • Information Security Career Path
  • Career Paths: How I Got Here
  • International Conference Guide
Members: please click on the following Journal issue links for access:
Computer: Bluetoad | PDF; Mobile: ePub | Mobi
Not a member? Read this month's feature article - Improving Cybersecurity Workforce Capacity and Capability: Addressing the Education-to-Workforce Disparity - at no charge or Join Now and gain full access to the ISSA Journal.



September 2015

Volume 13 - Issue 9

Feature articles include:

  • Information Assurance: Adapting to New Metaphors
  • Comprehensive National Cybersecurity Initiative
  • Identity and Access Management: A Shield against Malicious Insiders and Advanced Persistent Threats
  • Analyzing Temporal Patterns in Network Traffic: Models and Metrics for Situational Awareness and Security
  • International Conference Guide
Members: please click on the following Journal issue links for access:
Computer: Bluetoad | PDF; Mobile: ePub | Mobi
Not a member? Read this month's feature article - Information Assurance: Adapting to New Metaphors - at no charge or Join Now and gain full access to the ISSA Journal.



August 2015

Volume 13 - Issue 8

Feature articles include:

  • Information Security, Privacy, and the Law in Crisis Organizations
  • Privacy Metrics
  • Fundamentals of Privacy
  • Bridging the Gap between Privacy Requirements and Implementation with Semantic Privacy Modeling and a Privacy Technology Framework
Members: please click on the following Journal issue links for access:
Computer: Bluetoad | PDF; Mobile: ePub | Mobi
Not a member? Read this month's feature article - Information Security, Privacy, and the Law in Crisis Organizations - at no charge or Join Now and gain full access to the ISSA Journal.



July 2015

Volume 13 - Issue 7

Feature articles include:

  • Malware and How to Deal with It
  • Malicious Microsoft Office Documents: An Analyst’s View
  • Every Secure System Wants to Be a Reference Monitor
  • Profiling in a Digital World
  • Point-of-Sale Security, Malicious Software, and EMV
Members: please click on the following Journal issue links for access:
Computer: Bluetoad | PDF; Mobile: ePub | Mobi
Not a member? Read this month's feature article - Malware and How to Deal with It - at no charge or Join Now and gain full access to the ISSA Journal.



June 2015

Volume 13 - Issue 6

Feature articles include:

  • ISSA Election 2015 – Candidate Profiles
  • Securing the Industrial Internet of Things
  • Giles Event Correlation Engine Compiler
  • Transport Layer Secured Password-Authenticated Key Exchange
Members: please click on the following Journal issue links for access:
Computer: Bluetoad | PDF; Mobile: ePub | Mobi
Not a member? Read this month's feature article - Securing the Industrial Internet of Things - at no charge or Join Now and gain full access to the ISSA Journal.



May 2015

Volume 13 - Issue 5

Feature articles include:

  • Working with Indicators of Compromise
  • Free/Open Source Forensics Tools
  • Wireshark
  • Software Supply Chain Management with BOMtotal
  • Using a Governance Tool
  • Starting with YARA the Automated Way
Members: please click on the following Journal issue links for access:
Computer: Bluetoad | PDF; Mobile: ePub | Mobi
Not a member? Read this month's feature article - Working with Indicators of Compromise - at no charge or Join Now and gain full access to the ISSA Journal.



April 2015

Volume 13 - Issue 4

Feature articles include:

  • The Militarization of Cyberspace: Implications for the Private Sector
  • Multi-Factor Authentication: What to Look For
  • Adding the How-To to the NIST Cybersecurity Framework
  • Formal Security Protocol Analysis
Members: please click on the following Journal issue links for access:
Computer: Bluetoad | PDF; Mobile: ePub | Mobi
Not a member? Read this month's feature article - The Militarization of Cyberspace: Implications for the Private Sector - at no charge or Join Now and gain full access to the ISSA Journal.



March 2015

Volume 13 - Issue 3

Feature articles include:

  • Troubling Trends of Espionage
  • Power to the Password
  • Why We Need to Know Physical Security
  • The Identity of Things: Privacy and Security Concerns
Members: please click on the following Journal issue links for access:
Computer: Bluetoad | PDF; Mobile: ePub | Mobi
Not a member? Read this month's feature article - Troubling Trends of Espionage - at no charge or Join Now and gain full access to the ISSA Journal.


 

Community Search
Sign In


Forgot your password?

Haven't registered yet?

Calendar

2/11/2016
February 2016 Virtual CISO Series for e-mentoring Webinar

2/11/2016
SecureWorld Charlotte

2/23/2016
ISSA Web Conference: Security Software Supply Chain: Is What You See What You Get?

2/27/2016 » 2/28/2016
ISSA CISO Executive Forum - February 2016




Copyright © 2012, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information