Search results
1 – 10 of 49MFA involves requiring people to present more than one credential to authenticate themselves. These protocols reduce the risk and impact of credential theft, but also present…
Details
DOI: 10.1108/OXAN-DB280441
ISSN: 2633-304X
Keywords
Geographic
Topical
However, the alliance has struggled both to define the precise role it should play in cybersecurity and to execute effective cyber operations, given differences between the 30…
Details
DOI: 10.1108/OXAN-DB271719
ISSN: 2633-304X
Keywords
Geographic
Topical
Currently a theoretical threat, it could materialise in the future with wide-ranging implications. Quantum computers could be used to undermine cryptographic protection of…
Details
DOI: 10.1108/OXAN-DB272717
ISSN: 2633-304X
Keywords
Geographic
Topical
Several standards-setting organisations, including the International Organization for Standardization (ISO) and the National Institute of Standards and Technology (NIST), publish…
Details
DOI: 10.1108/OXAN-DB273638
ISSN: 2633-304X
Keywords
Geographic
Topical
Public and political scrutiny of the surveillance-for-hire industry has intensified ever since the Pegasus scandal broke last year. This has been aided by efforts by several large…
Details
DOI: 10.1108/OXAN-DB278436
ISSN: 2633-304X
Keywords
Geographic
Topical
Disinformation campaigns.
Details
DOI: 10.1108/OXAN-DB221794
ISSN: 2633-304X
Keywords
Geographic
Topical
Cybersecurity in smart cities.
Details
DOI: 10.1108/OXAN-DB243053
ISSN: 2633-304X
Keywords
Geographic
Topical
Multiple actors seek to do harm online for a variety of reasons -- from financial to political motivations. This is creating a new industry: cyber threat intelligence (CTI).
Details
DOI: 10.1108/OXAN-DB232211
ISSN: 2633-304X
Keywords
Geographic
Topical
Edge computing.
Details
DOI: 10.1108/OXAN-DB244253
ISSN: 2633-304X
Keywords
Geographic
Topical
Prospects for cyber security in 2017-22.