Contact Us   |   Print Page   |   Sign In   |   Register
The ISSA Journal

 

Contribute to the Journal:

Please contact the ISSA Journal Editor, and review in advance the Editorial Guidelines or the Open Forum Guidelines. Include the copyright release and submission checklist with your article. Published authors may be eligible for CPE credits.

Have you ever considered writing for publication? Would you find it helpful to bounce your ideas and concepts off other members who have published? Would it be helpful to get feedback on your draft? The Editorial Advisory Board will pair you with an experienced author. Sign up at Friends of Authors.

Interested in being a Friends of Authors mentor? See here for mentor guidance.

Advertise in the Journal: To learn about sponsorship opportunities, please contact Vendor Relations to request a Media Kit.

Meet the ISSA Journal Editorial Advisory Board.

Digital Archive for Members

Please click on the following journal issue links for access:
COMPUTER-Desktop/Laptop: Bluetoad | PDF; MOBILE-phone/tablet: iOS, Android ePub | Kindle Mobi



July 2018

Volume 16 - Issue 7

Feature articles include:

  • Evolution of the Cybersecurity Framework | Alex Grohmann
  • A Multi-Pronged Approach to GDPR Compliance | Mark Shriner
  • Information Security Standards: Differences, Benefits, Impacts, and Evolution } Antonella Commiato and Michael Sturgill
  • Net Neutrality: What Is It and Is It Necessary? | Nima Zahadat
  • PCAP Next Generation: Is Your Sniffer Up to Snuff? | Scott D. Fether
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Evolution of the Cybersecurity Framework - at no charge or Join Now and gain full access to the ISSA Journal.


June 2018

Volume 16 - Issue 6

Feature articles include:

  • S/MIME Certificate Management through DNS – DANE: A New Approach | Dena T. Bauckman
  • Rationalizing Behavioral Biometrics | Maria Schuett
  • Spoofing a Hardware Security Module | Jeff Stapleton
  • A Data-Centric, Defense-in-Depth Approach for Securing the Internet of Things | Mangaya Sivagnanam
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - S/MIME Certificate Management through DNS – DANE: A New Approach - at no charge or Join Now and gain full access to the ISSA Journal.


May 2018

Volume 16 - Issue 5

Feature articles include:

  • Practical and Actionable Cybersecurity Solutions for Securing Protected Health Information | Sue Wang and Zach Furness
  • Orchestration and Automation in the Real World | Ken Dunham
  • Security Threats, Defenses, and Recommended Practices for Enterprise Mobility | Vincent Sritapan and Karim Eldefrawy
  • Securing a Medical Device | Dave Presuhn and Andrew Bomett
  • Securing the Remote Employee: Protecting the Human Endpoint in the Cybersecurity Environment | Curtis Campbell
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Practical and Actionable Cybersecurity Solutions for Securing Protected Health Information - at no charge or Join Now and gain full access to the ISSA Journal.


April 2018

Volume 16 - Issue 4

Feature articles include:

  • Securing Complex Cyber-Physical Medical Device Landscapes | Ulrich Lang
  • The Dangers in Perpetuating a Culture of Risk Acceptance | Matt Wilgus
  • Using PKI to Build a Secure Industrial Internet of Things | Mike Nelson
  • The Two Faces of Innovation: From Safe and Dumb to Vulnerable Smart Products and Infrastructure | Steven W. Teppler
  • Cyber-Physical Intelligence | Tyson Brooks
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Securing Complex Cyber-Physical Medical Device Landscapes - at no charge or Join Now and gain full access to the ISSA Journal.


March 2018

Volume 16 - Issue 3

Feature articles include:

  • Security in Mergers and Acquisitions | Miriam T. Levenstein – ISSA member, Capitol of Texas Chapter
  • The Basics of Privileged Access Management | Michael Rogers – ISSA member, Minnesota Chapter
  • Baking an IT Risk Program from Scratch | Steve Horstman – ISSA member, Fort Worth Chapter
  • Orchestrating the Responses Between Information Security and Privacy During a Data Breach | David R. Jackson – ISSA member, National Capital (Washington, DC) Chapter
  • Dilemmas of a Security Architect: How to Protect Critical Systems without Disrupting Continuity of Their Services | Mariusz Stawowski – ISSA Senior member, Poland Chapter
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Security in Mergers and Acquisitions - at no charge or Join Now and gain full access to the ISSA Journal.


February 2018

Volume 16 - Issue 2

Feature articles include:

  • The Two Faces of Innovation: From Safe and Dumb to Vulnerable Smart Products and Infrastructure | Steven W. Teppler
  • Security Incidents and Breaches in the Healthcare Industry: A Case Study in the Lack of Federal and State Coordination | Barry S. Herrin – ISSA member, Metro Atlanta Chapter
  • CPU Bugs: Trading Security for Performance: Exploring the causes and long-term impact from the infamous Meltdown and Spectre vulnerabilities | Adrian Sanabria
  • Legal Requirements of Notification of Breaches: An Overview | Steve Kirby – ISSA member, Greater Spokane Chapter
  • The Post Exploitation Malware Era | Meir Brown
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - The Two Faces of Innovation: From Safe and Dumb to Vulnerable Smart Products and Infrastructure - at no charge or Join Now and gain full access to the ISSA Journal.


January 2018

Volume 16 - Issue 1

Feature articles include:

  • Lessons about Cloud Security from 1980s Horror Movies | Kayne McGladrey – ISSA member, Puget Sound Chapter
  • Cryptographic Architectures: Missing in Action | Jeff Stapleton – ISSA member, St. Louis Chapter
  • Cyberwar and International Law | Luther Martin – ISSA member, Silicon Valley Chapter and Cheryl He
  • Biometric Electronic Signatures | Phillip Griffin – ISSA Fellow, Raleigh Chapter
  • Securing the Vendor: Changing the Dynamic of the Infosec Relationship | Curtis Campbell – ISSA Senior Member, Chattanooga Chapter
  • When You Cannot Be Silent: Whistle-Blowing 2.0 | Avani Desai – ISSA Women in Security SIG member
  • Cybersecurity Risk in Health Care | Barry S. Herrin – ISSA member, Metro Atlanta Chapter
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Lessons about Cloud Security from 1980s Horror Movies - at no charge or Join Now and gain full access to the ISSA Journal.


December 2017

Volume 15 - Issue 12

Feature articles include:

  • A Simple Appeal to Common Sense: Why the Current Legal & Regulatory Regime for Information Security & Privacy Doesn’t Work, and Cannot Be Made to Work - Charles Cresson Wood, William S. Rogers, Jr., and Ralph Spencer Poore
  • Securing the Vendor: Changing the Dynamic of the Infosec Relationship- Curtis Campbell
  • Is Encryption Dead? Quantum Computing’s Impact on Cryptography - Frank Gearhart
  • Tort Liability in Open Source Software Systems - Samuel Roth
  • Opportunities and Threats Part 2: Threats to Modern Cryptography - Seetharaman Jeganathan
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - A Simple Appeal to Common Sense: Why the Current Legal & Regulatory Regime for Information Security & Privacy Doesn’t Work, and Cannot Be Made to Work - at no charge or Join Now and gain full access to the ISSA Journal.


November 2017

Volume 15 - Issue 11

Feature articles include:

  • Application of Quantum Technologies for Practical Tasks - Sergey Tikhonov and Miroslava Bondarenko
  • It’s Not the End of Cryptography as We Know It - Karen Martin
  • Biometric Electronic Signatures - Phillip Griffin
  • When Side-Channel Attacks Meet Quantum-Safe Cryptography - Zhenfei Zhang
  • Opportunities and Threats – Part 1: An Overview, Promises, and Introduction to Quantum Cryptography - Seetharaman Jeganathan
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Application of Quantum Technologies for Practical Tasks - at no charge or Join Now and gain full access to the ISSA Journal.


October 2017

Volume 15 - Issue 10

Feature articles include:

  • Addressing Malware with Cybersecurity Awareness - Carlos Valiente, Jr.
  • Malware in 2017: The More Things Change - Jacob Ansari
  • Hollywood Presbyterian Medical Center Ransomware: A Retrospective Review - Steve Giles and Brian Toevs
  • WannaCry/NotPetya and How We Failed Miserably! - Duncan McAlynn
  • What You Don’t Know Is Limiting Your Potential for Success - Gordon Merrill 
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Addressing Malware with Cybersecurity Awareness - at no charge or Join Now and gain full access to the ISSA Journal.


September 2017

Volume 15 - Issue 9

Feature articles include:

  • Access Control Capabilities and Healthcare Informatics Needs - Marcelo Carvalho
  • Cybersecurity Risk in Health Care - Barry S. Herrin
  • Healthcare Security Ailments and Treatments the World Needs to Know - Jon Sternstein
  • Medical Data Sharing: Establishing Trust in Health Information Exchange - Barbara Filkins
  • Leveraging a Control-Based Framework to Simplify the Risk Analysis Process - Bryan S. Cline
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Access Control Capabilities and Healthcare Informatics Needs - at no charge or Join Now and gain full access to the ISSA Journal.


August 2017

Volume 15 - Issue 8

Feature articles include:

  • The Future of Cybersecurity Needs Eyes and AIs on the Inside - Jason Kichen
  • Battening Down for the Rising Tide of IoT Risks - Anthony J. Ferrante
  • Blockchain: Considerations for Infosec - Gerry McGreevy
  • When You Cannot Be Silent: Whistle-Blowing 2.0 - Avani Desai
  • Disrupting the Disruptors: How Cybersecurity Can Confront Hackers and a Skilled Worker Shortage with Its Own Disruptive Technologies - Tyson Macaulay
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - The Future of Cybersecurity Needs Eyes and AIs on the Inside - at no charge or Join Now and gain full access to the ISSA Journal.


 

Community Search
Sign In


Calendar

7/24/2018
ISSA International Series: Trials & Tribulations of Social Engineering

8/4/2018 » 8/9/2018
Black Hat USA 2018

10/17/2018 » 10/18/2018
2018 ISSA International Conference




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information