Contact Us   |   Print Page   |   Sign In   |   Register
The ISSA Journal

 

Contribute to the Journal:

Please contact the ISSA Journal Editor, and review in advance the Editorial Guidelines or the Open Forum Guidelines. Include the copyright release and submission checklist with your article. Published authors may be eligible for CPE credits.

Have you ever considered writing for publication? Would you find it helpful to bounce your ideas and concepts off other members who have published? Would it be helpful to get feedback on your draft? The Editorial Advisory Board will pair you with an experienced author. Sign up at Friends of Authors.

Interested in being a Friends of Authors mentor? See here for mentor guidance.

Advertise in the Journal: To learn about sponsorship opportunities, please contact Vendor Relations to request a Media Kit.

Meet the ISSA Journal Editorial Advisory Board.

Digital Archive for Members

Please click on the following journal issue links for access:
COMPUTER-Desktop/Laptop: Bluetoad | PDF; MOBILE-phone/tablet: iOS, Android ePub | Kindle Mobi


April 2019

Volume 17 - Issue 4

Feature articles include:

  • Building a Risk-Based Information Security Culture | Donald A. McKeown
  • Basic Principles of Database Security | John Gray
  • Protecting Information Assets against Insider Threats | T. Sean Kelly and Andrew Shaxted
  • A Classification and Comparative Analysis of Cyber Intrusion Detection Techniques | Liu Hua Yeo, Xiangdong Che, and Shalini Lakkaraju
  • The Python Programming Language | Constantinos Doskas
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Building a Risk-Based Information Security Culture - at no charge or Join Now and gain full access to the ISSA Journal.


March 2019

Volume 17 - Issue 3

Feature articles include:

  • Application Security, Ethics, & Eight-Year-Olds | Matt Wilgus
  • The Quest for Visibility and Control in the Cloud | Yuri Diogenes
  • Countering Gender Disparity: Creating Anti-Predictions Using Data Science | Lori L. Cole
  • Lost Cryptographics Keys – Lessons from Gerald Cotton | Steve Kirby
  • Anonymous Digital Signatures | Phillip H. Griffin
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Application Security, Ethics, & Eight-Year-Olds - at no charge or Join Now and gain full access to the ISSA Journal.


February 2019

Volume 17 - Issue 2

Feature articles include:

  • California Dreaming – The Fight with the Federal Government over Technology | David R. Jackson
  • Bridging the Cyber Gap: Spotting Hidden Security Talent in Your Organization | Philip Casesa
  • SIEM Implementation for School Districts Utilizing FOSS | Alex Smith
  • Automation of Business-Aware Incident Management | Mariusz Stawowski
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - California Dreaming – The Fight with the Federal Government over Technology - at no charge or Join Now and gain full access to the ISSA Journal.


January 2019

Volume 17 - Issue 1

Feature articles include:

  • The Post Exploitation Malware Era | Meir Brown
  • How Cybersecurity Teams Can Support and Facilitate Compliance with the GDPR | Grace Buckler
  • Spoofing a Hardware Security Module | Jeff Stapleton
  • The Art of Pushing Left in Application Security | Kelley Bryant
  • Net Neutrality: What Is It and Is It Necessary? | Nima Zahadat
  • Practical Approaches to Overcome Security Challenges in Cloud Computing: Part 2: Private Cloud | Seetharaman Jeganathan
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - The Post Exploitation Malware Era - at no charge or Join Now and gain full access to the ISSA Journal.


December 2018

Volume 16 - Issue 12

Feature articles include:

  • The Future of IT Risk Management Will Be Quantified | Jack Freund
  • Our Journey in Phishing Mitigation | Jennifer Kinney and Aurobindo Sundaram
  • The Impact of Cryptocurrency on Modern-Day Cybercrime | Michael Doran
  • Practical Approaches to Overcome Security Challenges in Cloud Computing | Seetharaman Jeganathan
  • Did GDPR Revoke the Digital Certificate? | Jeff Stapleton and Stephen Wu
  • Staring Down the Future of Cloud Computing | Tim O’Neal
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - The Future of IT Risk Management Will Be Quantified - at no charge or Join Now and gain full access to the ISSA Journal.


November 2018

Volume 16 - Issue 11

Feature articles include:

  • Malware: Cat and Mouse Forever? | Ken Dunham
  • Pulling Back the Privacy Curtain | Reg Harnish
  • Holistic Approach to Enhance Your Security Posture | Yuri Diogenes
  • A Look at the Espionage Act of 1917 for the Internet Age | Whitney Partridge and Nima Zahadat
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Malware: Cat and Mouse Forever? - at no charge or Join Now and gain full access to the ISSA Journal.


October 2018

Volume 16 - Issue 10

Feature articles include:

  • Cloud Cryptography and Key Management | Jeff Stapleton
  • Bookworm: A Threat Hunting Story | Carl Saiyed
  • Cloud Security Due Diligence | Chris Wolski
  • Security Measures That Help Reduce the Cost of a Data Breach | Mangaya Sivagnanam
  • Extracting Timely Sign-in Data from Office 365 Logs | Mark J. Lucas
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Cloud Cryptography and Key Management - at no charge or Join Now and gain full access to the ISSA Journal.


September 2018

Volume 16 - Issue 9

Feature articles include:

  • How Cybersecurity Teams Can Support and Facilitate Compliance with the GDPR | Grace Buckle
  • The Brave Old New World of Privacy | Steven J. Ross and Robert G. Parker
  • On the Effects of Enterprise Security on Employee Privacy | Amn Rahman and Ashish Gehani
  • The Art of Pushing Left in Application Security | Kelley Bryant
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - How Cybersecurity Teams Can Support and Facilitate Compliance with the GDPR - at no charge or Join Now and gain full access to the ISSA Journal.


August 2018

Volume 16 - Issue 8

Feature articles include:

  • Cryptocurrency and Corporate Security | Anthony J. Ferrante and D. Frank Hsu
  • Employee and Insider Data Breaches: Vulnerability or Threat Vector? | Barry S. Herrin
  • The Genesis of the NATO Cooperative Cyber Defense Centre of Excellence | Michael R. Grimaila
  • Smarter Cyber Risk Governance for Health Care in a Digital Transformation Age | Indrajit Atluri
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Cryptocurrency and Corporate Security - at no charge or Join Now and gain full access to the ISSA Journal.


July 2018

Volume 16 - Issue 7

Feature articles include:

  • Evolution of the Cybersecurity Framework | Alex Grohmann
  • A Multi-Pronged Approach to GDPR Compliance | Mark Shriner
  • Information Security Standards: Differences, Benefits, Impacts, and Evolution } Antonella Commiato and Michael Sturgill
  • Net Neutrality: What Is It and Is It Necessary? | Nima Zahadat
  • PCAP Next Generation: Is Your Sniffer Up to Snuff? | Scott D. Fether
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Evolution of the Cybersecurity Framework - at no charge or Join Now and gain full access to the ISSA Journal.


June 2018

Volume 16 - Issue 6

Feature articles include:

  • S/MIME Certificate Management through DNS – DANE: A New Approach | Dena T. Bauckman
  • Rationalizing Behavioral Biometrics | Maria Schuett
  • Spoofing a Hardware Security Module | Jeff Stapleton
  • A Data-Centric, Defense-in-Depth Approach for Securing the Internet of Things | Mangaya Sivagnanam
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - S/MIME Certificate Management through DNS – DANE: A New Approach - at no charge or Join Now and gain full access to the ISSA Journal.


May 2018

Volume 16 - Issue 5

Feature articles include:

  • Practical and Actionable Cybersecurity Solutions for Securing Protected Health Information | Sue Wang and Zach Furness
  • Orchestration and Automation in the Real World | Ken Dunham
  • Security Threats, Defenses, and Recommended Practices for Enterprise Mobility | Vincent Sritapan and Karim Eldefrawy
  • Securing a Medical Device | Dave Presuhn and Andrew Bomett
  • Securing the Remote Employee: Protecting the Human Endpoint in the Cybersecurity Environment | Curtis Campbell
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Practical and Actionable Cybersecurity Solutions for Securing Protected Health Information - at no charge or Join Now and gain full access to the ISSA Journal.



 

Community Search
Sign In


Calendar

5/7/2019
4th Annual Healthcare Cybersecurity Summit

5/8/2019
ISSA Thought Leadership Series: Exploring The Frontier For Maliciousness In IPv6

5/15/2019
ISSA Thought Leadership Series - Zero Trust: The evolution of Perimeter Security

5/16/2019
ISSA of Wisconsin - Annual Meeting and Conference

6/5/2019
ISSA Thought Leadership Series: Security-as-a-Service for Small and Medium Sized Businesses





Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information