Organized, sophisticated and persistent cyber-threat agents pose a significant challenge to large high-value organizations. They are capable of disrupting and destroying cyber infrastructures, denying organizations access to their own IT services, and stealing sensitive information including intellectual property, trade secrets and customer data. Past research reveals that the recommended prevailing processes and practices of incident response (IR) are inadequate in addressing such attacks as they lack sufficient ‘situation awareness’ of the cyber-threat landscape and the broad business context. We therefore draw on situation awareness theory to interpret case study findings from a leading financial organization with a well-resourced and ma...
Over recent decades, we have moved our workflows, record management, and communications into digital...
We present the results of an interview study on the state of practice for Situational Awareness (SA)...
Digital assets of organizations are under constant threat from a wide assortment of nefarious actors...
Organized, sophisticated and persistent cyber-threat-actors pose a significant challenge to large, h...
Organizations today face a significant challenge in protecting their valuable IT assets. Cyber crimi...
Our case analysis presents and identifies significant and systemic shortcomings of the incident resp...
Abstract: Traditional cyber-incident response models have not changed signifi cantly since the early...
Abstract. Incident response is a critical security function in organisations that aims to manage inc...
© 2018 Dr. Humza NaseerThe modern enterprise uses risk-driven and control-centered security manageme...
Due to the rise of Cyber crime it is important to explore the Cyber security area. The threats are r...
The capability related to cybersecurity plays an ever-growing role on overall national security and ...
peer reviewedOur understanding of the defense mechanisms against cyber-attacks is, to a great extent...
This paper focuses on understanding the characteristics of multiple types of cyber-attacks through a...
This thesis was submitted for the award of Doctor of Philosophy and was awarded by Brunel University...
The importance of user awareness for information security is widely recognized in the information se...
Over recent decades, we have moved our workflows, record management, and communications into digital...
We present the results of an interview study on the state of practice for Situational Awareness (SA)...
Digital assets of organizations are under constant threat from a wide assortment of nefarious actors...
Organized, sophisticated and persistent cyber-threat-actors pose a significant challenge to large, h...
Organizations today face a significant challenge in protecting their valuable IT assets. Cyber crimi...
Our case analysis presents and identifies significant and systemic shortcomings of the incident resp...
Abstract: Traditional cyber-incident response models have not changed signifi cantly since the early...
Abstract. Incident response is a critical security function in organisations that aims to manage inc...
© 2018 Dr. Humza NaseerThe modern enterprise uses risk-driven and control-centered security manageme...
Due to the rise of Cyber crime it is important to explore the Cyber security area. The threats are r...
The capability related to cybersecurity plays an ever-growing role on overall national security and ...
peer reviewedOur understanding of the defense mechanisms against cyber-attacks is, to a great extent...
This paper focuses on understanding the characteristics of multiple types of cyber-attacks through a...
This thesis was submitted for the award of Doctor of Philosophy and was awarded by Brunel University...
The importance of user awareness for information security is widely recognized in the information se...
Over recent decades, we have moved our workflows, record management, and communications into digital...
We present the results of an interview study on the state of practice for Situational Awareness (SA)...
Digital assets of organizations are under constant threat from a wide assortment of nefarious actors...