Skip to main content
Register for updates
Main menu
Home
All Journals
Finance
Management
Marketing
Digital
Real Estate / Property
Main menu
Home
All Journals
Finance
Management
Marketing
Digital
Real Estate / Property
Register for updates
csj Journals
Cyber Security: A Peer-Reviewed Journal Sample Articles
No Assigned Volume
Sample Article
Consider the consequences: A powerful approach for reducing ICS cyber risk
Richard Wyman, Professional Control Systems Engineer, Idaho National Laboratory
Sample Article
Cyber incidents: How best to work with law enforcement
David H. Laufman, Sean Newell, Stephen Reynolds, Mike Buchwald, National Security Division, US Department of Justice
Sample Article
Data breach litigation and regulatory enforcement: A survey of our present and how to prepare for the future
Behnam Dayanim, Partner and Edward George, Associate, Paul Hastings
Sample Article
Emerging trends in insurance coverage: Massive encryption attacks create urgent need for business interruption and cyber coverage
Sean Hoar, Peter M. Marchel
Sample Article
How a well-thought-out incident response can take the advantage back from attackers
James Christiansen, Vice President, Netskope
Sample Article
How machine learning is catching up with the insider threat
Jamie Graves, Founder and CEO, ZoneFox
Sample Article
How to stop attackers from owning your Active Directory
Carolyn Crandall, Chief Security Advocate and Tony Cole, Chief Technology Officer, Attivo Networks
Sample Article
Human aspects of cyber security: Behaviour or culture change
Adam Joinson, Professor of Information Systems and Tommy van Steen, Post-doctoral Research Associate, School of Management, University of Bath
Sample Article
Identity crisis: Detecting account opening fraud in the age of identity commoditisation
Uri Rivner, VP Cyber Strategy, BioCatch
Sample Article
IT modernisation in the energy sector: Preventing cyberthreats to critical infrastructure
Pamela K. Isom, Deputy Chief Information Officer, United States Department of Energy
Sample Article
Malware development threats with modern technologies
Lawrence Amer, Cybersecurity Manager, PwC
Sample Article
Open sesame: Lessons in password-based user authentication
Bahman Rashidi, Cybersecurity Research Engineer and Vaibhav Garg, Senior Director of Cybersecurity Research & Public Policy, Comcast Cable
Sample Article
Tackling cybercrime and ransomware head-on: Disrupting criminal networks and protecting organisations
Marja Laitinen, Digital Crimes Unit Lead and Sarah Armstrong-Smith, Chief Security Advisor, Microsoft EMEA
Sample Article
Think like a hacker: Reducing cyber security risk by improving api design and protection
Gerhard Giese, Senior Manager, Akamai Technologies
Featured Article