Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
The ISSA Journal

 

ISSA Journal Scholastic Writing Award

Click here for more information

Contribute to the Journal:

Please contact the ISSA Journal Editor, and review in advance the Editorial Guidelines or the Open Forum Guidelines. Include the copyright release and submission checklist with your article. Published authors may be eligible for CPE credits.

Have you ever considered writing for publication? Would you find it helpful to bounce your ideas and concepts off other members who have published? Would it be helpful to get feedback on your draft? The Editorial Advisory Board will pair you with an experienced author. Sign up at Friends of Authors.

 

Advertise in the Journal: To learn about sponsorship opportunities, please contact Vendor Relations to request a Media Kit.

Meet the ISSA Journal Editorial Advisory Board.

Digital Archive for Members

Please click on the following journal issue links for access:
COMPUTER-Desktop/Laptop: Bluetoad | PDF; MOBILE-phone/tablet: iOS, Android ePub | Kindle Mobi



December 2016

Volume 14 - Issue 12

Feature articles include:

  • Enterprise Security Architecture: Key for Aligning Security Goals with Business Goals - Seetharaman Jeganathan
  • Secure Network Design: Micro Segmentation - Brandon Peterson
  • Secure ERP Implementation - Alexander Polyakov
  • Fallacies in Threat Intelligence Lead to Fault Lines in Organizational Security Postures - Jeff Bardin
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Enterprise Security Architecture: Key for Aligning Security Goals with Business Goals - at no charge or Join Now and gain full access to the ISSA Journal.



November 2016

Volume 14 - Issue 11

Feature articles include:

  • Beware the Blockchain - Karen Martin
  • How Not to Become Statistics: What CISOs Should Know on Cyber Insurance, Privacy, and Innovations - Ilya Kabanov
  • The Race against Cyber Crime Is Lost without Artificial Intelligence - Keith Moore
  • Infosec Careers and Guidance - Rajinder Tumber
  • Security Legal Update - Monique Ferraro
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Beware the Blockchain - at no charge or Join Now and gain full access to the ISSA Journal.



October 2016

Volume 14 - Issue 10

Feature articles include:

  • Resolving the Cybersecurity Workforce Shortage - Kerry Anderson
  • Cyber Workforce Strategy: Developing Professionals Internally - Jeff Fenton
  • The Role of the Adjunct in Educating the Security Practitioner - Karen Quagliata
  • Infosec Staffing - Steve Riess
  • ISSA 2016 Conference Guide
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Resolving the Cybersecurity Workforce Shortage - at no charge or Join Now and gain full access to the ISSA Journal.



September 2016

Volume 14 - Issue 9

Feature articles include:

  • Payment Card Security: Is a Standard Enough? - Kimberly Wamba
  • Attacker with Administrator Rights - Jeff Hall
  • Payment Ecosystem Security - Smrithi Konanu
  • Practical View of Payment Security for Online Banking Systems - Sergey Tikhonov and Miroslava Bondarenko
  • The Use and Misuse of Entropy - Luther Martin and Tim Roake
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Payment Card Security: Is a Standard Enough? - at no charge or Join Now and gain full access to the ISSA Journal.



August 2016

Volume 14 - Issue 8

Feature articles include:

  • Machine Learning: A Primer for Security - Stephan Jou
  • Internet of Things: Trust - R. S. Tumber
  • Internet of Things: Security, Privacy and Governance = Regner Sabillon
  • Internet of Things: Arduino Vulnerability Analysis - Audrey Ann Gendreau
  • Internet of Things: Key Challenges to Overcome - Aditya Srivastava
  • Cloud Dilemma? - Alen Ilic
Members: please click on the following Journal issue links for access:
Computer: Bluetoad | PDF; Mobile: ePub | Mobi
Not a member? Read this month's feature article - Machine Learning: A Primer for Security - at no charge or Join Now and gain full access to the ISSA Journal.



July 2016

Volume 14 - Issue 7

Feature articles include:

  • Impact of Social Media on Cybersecurity Employment and How to Use It to Improve Your Career - Tim Howard
  • Social Media Impact: Is It Possible to Be Social and Secure? - Yuri Diogenes
  • User-Managed Access: Do We Need Yet Another Standard? - Patryk Królikowski
  • Social Media: The Danger Zone - By R. S. Tumber
  • Stop Delivery of Phishing Emails - Gary Landauv
Members: please click on the following Journal issue links for access:
Computer: Bluetoad | PDF; Mobile: ePub | Mobi
Not a member? Read this month's feature article - Impact of Social Media on Cybersecurity Employment and How to Use It to Improve Your Career - at no charge or Join Now and gain full access to the ISSA Journal.



June 2016

Volume 14 - Issue 6

Feature articles include:

  • 2016 International Election Candidate Profiles
  • Preparing for New Electronic Communication Privacy Laws - Rouman Ebrahim
  • Cybersecurity Whistleblowing: What Employees at Public Companies Should Know Before Reporting Information Security Concerns - Dallas Hammer
  • Addressing Data Privacy Regulation & Standards: A Process - Harsha Banavara and Jeffrey Farago
  • Blockchain: The Legal Industry - R. S. Tumber
Members: please click on the following Journal issue links for access:
Computer: Bluetoad | PDF; Mobile: ePub | Mobi
Not a member? Read this month's feature article - Preparing for New Electronic Communication Privacy Laws - at no charge or Join Now and gain full access to the ISSA Journal.




May 2016

Volume 14 - Issue 5

Feature articles include:

  • 2016 International Election Candidate Profiles
  • Do Data Breaches Matter? A Review of Breach Data and What to Do Next - Kristopher Dane
  • FedRAMP’s Database Scanning Requirement: The Letter and Spirit - Matt Wilgus
  • Smart Practices in Managing an Identity-Auditing Project - Kerry Anderson
  • On the Costs of Bitcoin Connectivity - Ashish Gehani
Members: please click on the following Journal issue links for access:
Computer: Bluetoad | PDF; Mobile: ePub | Mobi
Not a member? Read this month's feature article - Do Data Breaches Matter? A Review of Breach Data and What to Do Next - at no charge or Join Now and gain full access to the ISSA Journal.



April 2016

Volume 14 - Issue 4

Feature articles include:

  • CryptoLocker - Carl Saiyed
  • Protecting against Tomorrow’s Malware Attacks Today - Guy Bunker
  • The Rise of Malicious Documents - Didier Stevens
  • The Practice of Malware Protection for Commercial Banking - Sergey Tikhonov and Miroslava Bondarenko
  • The Hotel Industry Has a PoS Malware Problem - Andy Green
  • Evolving Ransomware - Stu Sjouwerman
Members: please click on the following Journal issue links for access:
Computer: Bluetoad | PDF; Mobile: ePub | Mobi
Not a member? Read this month's feature article - CryptoLocker - at no charge or Join Now and gain full access to the ISSA Journal.



March 2016

Volume 14 - Issue 3

Feature articles include:

  • Crypto Wars II - Luther Martin and Amy Vosters
  • Fragmentation in Mobile Devices - Ken Smith
  • Mobile Application Security - Smrithi Konanur and Jason Paul Kazarian
  • Mobile App Testing for the Enterprise - Vincent Sritapan and Angelos Stavrou
Members: please click on the following Journal issue links for access:
Computer: Bluetoad | PDF; Mobile: ePub | Mobi
Not a member? Read this month's feature article - Crypto Wars II - at no charge or Join Now and gain full access to the ISSA Journal.



February 2016

Volume 14 - Issue 2

Feature articles include:

  • Protecting Your Data against Cyber Attacks in Big Data Environments - Reiner Kappenberger
  • Using Data Breach Reports to Assess Risk Analysis Quality - Jack Freund, Stephen Fritts, and Joan Marius
  • Security’s Seat at the Big Data Table - Tony Rice
  • Why Information Security Teams Fail - Jason Lang
  • Securing Data to Prevent Data Theft - Barry Stetler
Members: please click on the following Journal issue links for access:
Computer: Bluetoad | PDF; Mobile: ePub | Mobi
Not a member? Read this month's feature article - Protecting Your Data against Cyber Attacks in Big Data Environments - at no charge or Join Now and gain full access to the ISSA Journal.



January 2016

Volume 14 - Issue 1

Feature articles include:

  • Promoting Public Cloud Workload Security: Legal and Technical Aspects by Jason Paul Kazarian
  • Gaining Confidence in the Cloud by Phillip Griffin and Jeff Stapleton
  • Why Risk Management Is Hard by Luther Martin and Amy Vosters
  • Securing the Cloud by Barettè Mort
Members: please click on the following Journal issue links for access:
Computer: Bluetoad | PDF; Mobile: ePub | Mobi
Not a member? Read this month's feature article - Promoting Public Cloud Workload Security: Legal and Technical Aspects - at no charge or Join Now and gain full access to the ISSA Journal.


 

Community Search
Sign In


Forgot your password?

Haven't registered yet?

Calendar

12/10/2016
SecureMiami

12/12/2016
Women in Security SIG Monthly Webinar

12/13/2016
SANS/ISSA Women's CONNECT Event

12/15/2016
Healthcare SIG Webinar: Auditing and Access to Electronic Health Records




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information