Print Page   |   Contact Us   |   Sign In   |   Register
The ISSA Journal

 

Contribute to the Journal:

Please contact the ISSA Journal Editor, and review in advance the Editorial Guidelines or the Open Forum Guidelines. Include the copyright release and submission checklist with your article. Published authors may be eligible for CPE credits.

Have you ever considered writing for publication? Would you find it helpful to bounce your ideas and concepts off other members who have published? Would it be helpful to get feedback on your draft? The Editorial Advisory Board will pair you with an experienced author. Sign up at Friends of Authors.

Interested in being a Friends of Authors mentor? See here for mentor guidance.

Advertise in the Journal: To learn about sponsorship opportunities, please contact Vendor Relations to request a Media Kit.

Meet the ISSA Journal Editorial Advisory Board.

Digital Archive for Members

Please click on the following journal issue links for access:
COMPUTER-Desktop/Laptop: Bluetoad | PDF; MOBILE-phone/tablet: iOS, Android ePub | Kindle Mobi


December 2017

Volume 15 - Issue 12

Feature articles include:

  • A Simple Appeal to Common Sense: Why the Current Legal & Regulatory Regime for Information Security & Privacy Doesn’t Work, and Cannot Be Made to Work - Charles Cresson Wood, William S. Rogers, Jr., and Ralph Spencer Poore
  • Securing the Vendor: Changing the Dynamic of the Infosec Relationship- Curtis Campbell
  • Is Encryption Dead? Quantum Computing’s Impact on Cryptography - Frank Gearhart
  • Tort Liability in Open Source Software Systems - Samuel Roth
  • Opportunities and Threats Part 2: Threats to Modern Cryptography - Seetharaman Jeganathan
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - A Simple Appeal to Common Sense: Why the Current Legal & Regulatory Regime for Information Security & Privacy Doesn’t Work, and Cannot Be Made to Work - at no charge or Join Now and gain full access to the ISSA Journal.


November 2017

Volume 15 - Issue 11

Feature articles include:

  • Application of Quantum Technologies for Practical Tasks - Sergey Tikhonov and Miroslava Bondarenko
  • It’s Not the End of Cryptography as We Know It - Karen Martin
  • Biometric Electronic Signatures - Phillip Griffin
  • When Side-Channel Attacks Meet Quantum-Safe Cryptography - Zhenfei Zhang
  • Opportunities and Threats – Part 1: An Overview, Promises, and Introduction to Quantum Cryptography - Seetharaman Jeganathan
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Application of Quantum Technologies for Practical Tasks - at no charge or Join Now and gain full access to the ISSA Journal.


October 2017

Volume 15 - Issue 10

Feature articles include:

  • Addressing Malware with Cybersecurity Awareness - Carlos Valiente, Jr.
  • Malware in 2017: The More Things Change - Jacob Ansari
  • Hollywood Presbyterian Medical Center Ransomware: A Retrospective Review - Steve Giles and Brian Toevs
  • WannaCry/NotPetya and How We Failed Miserably! - Duncan McAlynn
  • What You Don’t Know Is Limiting Your Potential for Success - Gordon Merrill 
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Addressing Malware with Cybersecurity Awareness - at no charge or Join Now and gain full access to the ISSA Journal.


September 2017

Volume 15 - Issue 9

Feature articles include:

  • Access Control Capabilities and Healthcare Informatics Needs - Marcelo Carvalho
  • Cybersecurity Risk in Health Care - Barry S. Herrin
  • Healthcare Security Ailments and Treatments the World Needs to Know - Jon Sternstein
  • Medical Data Sharing: Establishing Trust in Health Information Exchange - Barbara Filkins
  • Leveraging a Control-Based Framework to Simplify the Risk Analysis Process - Bryan S. Cline
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Access Control Capabilities and Healthcare Informatics Needs - at no charge or Join Now and gain full access to the ISSA Journal.


August 2017

Volume 15 - Issue 8

Feature articles include:

  • The Future of Cybersecurity Needs Eyes and AIs on the Inside - Jason Kichen
  • Battening Down for the Rising Tide of IoT Risks - Anthony J. Ferrante
  • Blockchain: Considerations for Infosec - Gerry McGreevy
  • When You Cannot Be Silent: Whistle-Blowing 2.0 - Avani Desai
  • Disrupting the Disruptors: How Cybersecurity Can Confront Hackers and a Skilled Worker Shortage with Its Own Disruptive Technologies - Tyson Macaulay
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - The Future of Cybersecurity Needs Eyes and AIs on the Inside - at no charge or Join Now and gain full access to the ISSA Journal.


July 2017

Volume 15 - Issue7

Feature articles include:

  • Cryptographic Architectures: Missing in Action - Jeff Stapleton
  • Cyberwar and International Law - Luther Martin and Cheryl He
  • Building a Phishing Program: Why Haven’t You Started Yet? - Tonia Dudley
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Cryptographic Architectures: Missing in Action - Jeff Stapleton - at no charge or Join Now and gain full access to the ISSA Journal.


June 2017

Volume 15 - Issue 6

Feature articles include:

  • 2017 International Election Candidate Profiles
  • The Promise and Limits of Big Data for Improving Intrusion Detection - Mark R. Heckman
  • What Happens When AI Meets Security Awareness? - Tom Pendergast
  • Deep Learning and Security: Beyond the Hype - Stephan Jou
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - The Promise and Limits of Big Data for Improving Intrusion Detection - at no charge or Join Now and gain full access to the ISSA Journal.


May 2017

Volume 15 - Issue 5

Feature articles include:

  • 2017 International Election Candidate Profiles
  • Recon and Respond to Malware Threats in the Cloud - Ravi Balupari and Abhinav Singh
  • Best Practices When Implementing Web Application Scanning into an SDLC - Matt Wilgus
  • Embracing Cloud Computing to Enhance Your Overall Security Posture - Yuri Diogenes
  • Security Assurance of Docker Containers: Part 2 - Stefan Winkel
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Recon and Respond to Malware Threats in the Cloud - at no charge or Join Now and gain full access to the ISSA Journal.


April 2017

Volume 15 - Issue 4

Feature articles include:

  • The Whys and Wherefores of Innovation in the World of Cybersecurity - Avani Desai
  • There’s No Going It Alone: Disrupting Major Cybercrime Rings (a Case Study) - John Garris
  • Every Move You Make, I’ll Be Watching You Watching Me Watching You - Tanya Forsheit and Daniel Goldberg
  • HSTS and New Trends for Secure Browsing - Marcelo Carvalho
  • Security Assurance of Docker Containers: Part 1 - Stefan Winkel
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - The Whys and Wherefores of Innovation in the World of Cybersecurity - at no charge or Join Now and gain full access to the ISSA Journal.



March 2017

Volume 15 - Issue 3

Feature articles include:

  • When Baby Monitors Become Weapons: Manufacturer Liability for Distributed Denial of Service Attacks by an Internet of Things Botnet Army - Emily Duke and Anthony S. Mendoza
  • Lessons about Cloud Security from 1980s Horror Movies - Kayne McGladrey
  • Growing Popularity and Challenges of the IoT - Keith Russell
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - When Baby Monitors Become Weapons: Manufacturer Liability for Distributed Denial of Service Attacks by an Internet of Things Botnet Army - at no charge or Join Now and gain full access to the ISSA Journal.



February 2017

Volume 15 - Issue 2

Feature articles include:

  • Blended Families: Initial Steps to Security and Privacy Collaboration - Grace Buckler
  • Practical Steps for Compliance with New EU Data Privacy Regulations - Patrick Looney
  • Contextualizing the Blurring Boundaries of Information Security, Privacy, and Legal Aspects - Muzamil Riffat
  • Regulatory Review of 2016 and a Look Ahead - David Jackson
  • Achieving Compliance with Internal Controls - Carlos Valiente, Jr.
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Blended Families: Initial Steps to Security and Privacy Collaboration - at no charge or Join Now and gain full access to the ISSA Journal.



January 2017

Volume 15 - Issue 1

Feature articles include:

  • Article of the Year: Machine Learning: A Primer for Security - Stephan Jou
  • Enterprise Security Architecture: Key for Aligning Security Goals with Business Goals - Seetharaman Jeganathan
  • The Role of the Adjunct in Educating the Security Practitioner - Karen Quagliata
  • Fragmentation in Mobile Devices - Ken Smith
  • Gaining Confidence in the Cloud - Phillip Griffin and Jeff Stapleton
  • Crypto Wars II - Luther Martin and Amy Vosters
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Machine Learning: A Primer for Security - at no charge or Join Now and gain full access to the ISSA Journal.


 

Community Search
Sign In
Sign In securely
Calendar

12/14/2017
ISSA Healthcare SIG 4th Quarter Webinar - Lessons Learned and Recovery from Breaches

12/15/2017
ISSA Financial SIG - 4th Quarter Webinar - Security Review and Predictions for FI

12/15/2017
Women’s Connect – ISSA Central MD, ISSA National Capital Region, ISSA NOVA

1/25/2018 » 1/26/2018
January CISO Forum Scottsdale 2018




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information