 |
February 2019Volume 17 - Issue 2
Feature articles include:
- California Dreaming – The Fight with the Federal Government over Technology | David R. Jackson
- Bridging the Cyber Gap: Spotting Hidden Security Talent in Your Organization | Philip Casesa
- SIEM Implementation for School Districts Utilizing FOSS | Alex Smith
- Automation of Business-Aware Incident Management | Mariusz Stawowski
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi |
Not a member? Read this month's feature article - California Dreaming – The Fight with the Federal Government over Technology - at no charge or Join Now and gain full access to the ISSA Journal.
|
|
 |
January 2019Volume 17 - Issue 1
Feature articles include:
- The Post Exploitation Malware Era | Meir Brown
- How Cybersecurity Teams Can Support and Facilitate Compliance with the GDPR | Grace Buckler
- Spoofing a Hardware Security Module | Jeff Stapleton
- The Art of Pushing Left in Application Security | Kelley Bryant
- Net Neutrality: What Is It and Is It Necessary? | Nima Zahadat
- Practical Approaches to Overcome Security Challenges in Cloud Computing: Part 2: Private Cloud | Seetharaman Jeganathan
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi |
Not a member? Read this month's feature article - The Post Exploitation Malware Era - at no charge or Join Now and gain full access to the ISSA Journal.
|
|
 |
December 2018Volume 16 - Issue 12
Feature articles include:
- The Future of IT Risk Management Will Be Quantified | Jack Freund
- Our Journey in Phishing Mitigation | Jennifer Kinney and Aurobindo Sundaram
- The Impact of Cryptocurrency on Modern-Day Cybercrime | Michael Doran
- Practical Approaches to Overcome Security Challenges in Cloud Computing | Seetharaman Jeganathan
- Did GDPR Revoke the Digital Certificate? | Jeff Stapleton and Stephen Wu
- Staring Down the Future of Cloud Computing | Tim O’Neal
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi |
Not a member? Read this month's feature article - The Future of IT Risk Management Will Be Quantified - at no charge or Join Now and gain full access to the ISSA Journal.
|
|
 |
November 2018Volume 16 - Issue 11
Feature articles include:
- Malware: Cat and Mouse Forever? | Ken Dunham
- Pulling Back the Privacy Curtain | Reg Harnish
- Holistic Approach to Enhance Your Security Posture | Yuri Diogenes
- A Look at the Espionage Act of 1917 for the Internet Age | Whitney Partridge and Nima Zahadat
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi |
Not a member? Read this month's feature article - Malware: Cat and Mouse Forever? - at no charge or Join Now and gain full access to the ISSA Journal.
|
|
 |
October 2018Volume 16 - Issue 10
Feature articles include:
- Cloud Cryptography and Key Management | Jeff Stapleton
- Bookworm: A Threat Hunting Story | Carl Saiyed
- Cloud Security Due Diligence | Chris Wolski
- Security Measures That Help Reduce the Cost of a Data Breach | Mangaya Sivagnanam
- Extracting Timely Sign-in Data from Office 365 Logs | Mark J. Lucas
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi |
Not a member? Read this month's feature article - Cloud Cryptography and Key Management - at no charge or Join Now and gain full access to the ISSA Journal.
|
|
 |
September 2018Volume 16 - Issue 9
Feature articles include:
- How Cybersecurity Teams Can Support and Facilitate Compliance with the GDPR | Grace Buckle
- The Brave Old New World of Privacy | Steven J. Ross and Robert G. Parker
- On the Effects of Enterprise Security on Employee Privacy | Amn Rahman and Ashish Gehani
- The Art of Pushing Left in Application Security | Kelley Bryant
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi |
Not a member? Read this month's feature article - How Cybersecurity Teams Can Support and Facilitate Compliance with the GDPR - at no charge or Join Now and gain full access to the ISSA Journal.
|
|
 |
August 2018Volume 16 - Issue 8
Feature articles include:
- Cryptocurrency and Corporate Security | Anthony J. Ferrante and D. Frank Hsu
- Employee and Insider Data Breaches: Vulnerability or Threat Vector? | Barry S. Herrin
- The Genesis of the NATO Cooperative Cyber Defense Centre of Excellence | Michael R. Grimaila
- Smarter Cyber Risk Governance for Health Care in a Digital Transformation Age | Indrajit Atluri
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi |
Not a member? Read this month's feature article - Cryptocurrency and Corporate Security - at no charge or Join Now and gain full access to the ISSA Journal.
|
|
 |
July 2018Volume 16 - Issue 7
Feature articles include:
- Evolution of the Cybersecurity Framework | Alex Grohmann
- A Multi-Pronged Approach to GDPR Compliance | Mark Shriner
- Information Security Standards: Differences, Benefits, Impacts, and Evolution } Antonella Commiato and Michael Sturgill
- Net Neutrality: What Is It and Is It Necessary? | Nima Zahadat
- PCAP Next Generation: Is Your Sniffer Up to Snuff? | Scott D. Fether
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi |
Not a member? Read this month's feature article - Evolution of the Cybersecurity Framework - at no charge or Join Now and gain full access to the ISSA Journal.
|
|
 |
June 2018Volume 16 - Issue 6
Feature articles include:
- S/MIME Certificate Management through DNS – DANE: A New Approach | Dena T. Bauckman
- Rationalizing Behavioral Biometrics | Maria Schuett
- Spoofing a Hardware Security Module | Jeff Stapleton
- A Data-Centric, Defense-in-Depth Approach for Securing the Internet of Things | Mangaya Sivagnanam
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi |
Not a member? Read this month's feature article - S/MIME Certificate Management through DNS – DANE: A New Approach - at no charge or Join Now and gain full access to the ISSA Journal.
|
|
 |
May 2018Volume 16 - Issue 5
Feature articles include:
- Practical and Actionable Cybersecurity Solutions for Securing Protected Health Information | Sue Wang and Zach Furness
- Orchestration and Automation in the Real World | Ken Dunham
- Security Threats, Defenses, and Recommended Practices for Enterprise Mobility | Vincent Sritapan and Karim Eldefrawy
- Securing a Medical Device | Dave Presuhn and Andrew Bomett
- Securing the Remote Employee: Protecting the Human Endpoint in the Cybersecurity Environment | Curtis Campbell
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi |
Not a member? Read this month's feature article - Practical and Actionable Cybersecurity Solutions for Securing Protected Health Information - at no charge or Join Now and gain full access to the ISSA Journal.
|
|
 |
April 2018Volume 16 - Issue 4
Feature articles include:
- Securing Complex Cyber-Physical Medical Device Landscapes | Ulrich Lang
- The Dangers in Perpetuating a Culture of Risk Acceptance | Matt Wilgus
- Using PKI to Build a Secure Industrial Internet of Things | Mike Nelson
- The Two Faces of Innovation: From Safe and Dumb to Vulnerable Smart Products and Infrastructure | Steven W. Teppler
- Cyber-Physical Intelligence | Tyson Brooks
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi |
Not a member? Read this month's feature article - Securing Complex Cyber-Physical Medical Device Landscapes - at no charge or Join Now and gain full access to the ISSA Journal.
|
|
 |
March 2018Volume 16 - Issue 3
Feature articles include:
- Security in Mergers and Acquisitions | Miriam T. Levenstein – ISSA member, Capitol of Texas Chapter
- The Basics of Privileged Access Management | Michael Rogers – ISSA member, Minnesota Chapter
- Baking an IT Risk Program from Scratch | Steve Horstman – ISSA member, Fort Worth Chapter
- Orchestrating the Responses Between Information Security and Privacy During a Data Breach | David R. Jackson – ISSA member, National Capital (Washington, DC) Chapter
- Dilemmas of a Security Architect: How to Protect Critical Systems without Disrupting Continuity of Their Services | Mariusz Stawowski – ISSA Senior member, Poland Chapter
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi |
Not a member? Read this month's feature article - Security in Mergers and Acquisitions - at no charge or Join Now and gain full access to the ISSA Journal.
|
|
|