In this article Nicola Bates discusses whether the civilian autonomous vehicle security frameworks are suitable for military logistics autonomous vehicles, and examines the threats considered from the point of view of an enemy so as to identify critical weaknesses and countermeasures. The Computer Weekly article can be found here.
Organisations may turn to cyber insurance to cover a portion of their enterprise risk. In this article Rob Champion summarises high level findings on a practical model that could be used in lieu of actuarial data. The Computer Weekly article can be found here.
The emergence of connected and autonomous vehicle is an exciting trend. In this article Juliet Flavell discusses some of the requirements, constraints and challenges, and areas of uncertainty in this technology. The Computer Weekly article can be found here.
In this article Jan Kalbantner describes a widespread attack based on a hardware vulnerability, and discusses what paths future research might take to mitigate variants of this attack. The Computer Weekly article can be found here.
In this article Tony Leary dissects the 2017 incident where the ‘WannaCry’ ransomware infected 32 National Health Service trusts in England and discusses the principal causes. The Computer Weekly article can be found here.
Connected devices suffer from malware infection and one of the defences against this is the detection of malware using clustering algorithms. Rebecca Merriman studies the accuracy of such algorithms in this article and discusses factors that might affect the results. The Computer Weekly article can be found here.
In this article Felisha Mouchous proposes a threat modelling and security testing framework to allow organisations to leverage existing data to identify gaps in defences and understand threat actor behaviour. The Computer Weekly article can be found here.
In this article Daniyal Naeem outlines a strategy to identify what security attributes a good USB security management system must have, and compares the new strategy with established methods. The Computer Weekly article can be found here.