default search action
Steve Mansfield-Devine
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j64]Steve Mansfield-Devine:
Meeting the challenges of cyber security. Netw. Secur. 2024(1) (2024) - [j63]Steve Mansfield-Devine:
Grasping the nettle of cyber governance. Netw. Secur. 2024(2) (2024) - [j62]Steve Mansfield-Devine:
Back to basics to fight flaws. Netw. Secur. 2024(3) (2024) - [j61]Steve Mansfield-Devine:
Poor cyber hygiene puts the UK at risk. Netw. Secur. 2024(5) (2024) - 2023
- [j60]Steve Mansfield-Devine:
Do you have too much security? Netw. Secur. 2023(3) (2023) - [j59]Steve Mansfield-Devine:
Weaponising ChatGPT. Netw. Secur. 2023(4) (2023) - 2022
- [j58]Steve Mansfield-Devine:
IBM: Cost of a Data Breach. Netw. Secur. 2022(8) (2022) - 2021
- [j57]Steve Mansfield-Devine:
Who's that knocking at the door? The problem of credential abuse. Netw. Secur. 2021(2): 6-15 (2021) - [j56]Steve Mansfield-Devine:
Locking the door: tackling credential abuse. Netw. Secur. 2021(3): 11-19 (2021) - 2020
- [j55]Steve Mansfield-Devine:
Nation-state attacks: the escalating menace. Netw. Secur. 2020(12): 12-17 (2020)
2010 – 2019
- 2019
- [j54]Steve Mansfield-Devine:
The state of operational technology security. Netw. Secur. 2019(10): 9-13 (2019) - 2018
- [j53]Steve Mansfield-Devine:
Open source and the Internet of Things. Netw. Secur. 2018(2): 14-19 (2018) - [j52]Steve Mansfield-Devine:
The intelligent way to protect complex environments. Netw. Secur. 2018(5): 13-17 (2018) - [j51]Steve Mansfield-Devine:
Friendly fire: how penetration testing can reduce your risk. Netw. Secur. 2018(6): 16-19 (2018) - [j50]Steve Mansfield-Devine:
DevOps: finding room for security. Netw. Secur. 2018(7): 15-20 (2018) - [j49]Steve Mansfield-Devine:
Knowing what you have: the road to effective data discovery. Netw. Secur. 2018(8): 15-19 (2018) - [j48]Steve Mansfield-Devine:
Hacking democracy: abusing the Internet for political gain. Netw. Secur. 2018(10): 15-19 (2018) - [j47]Steve Mansfield-Devine:
Nation-state attacks: the start of a new Cold War? Netw. Secur. 2018(11): 15-19 (2018) - [j46]Steve Mansfield-Devine:
Getting to grips with IoT. Netw. Secur. 2018(12): 15-19 (2018) - 2017
- [j45]Steve Mansfield-Devine:
Open source software: determining the real risk posed by vulnerabilities. Netw. Secur. 2017(1): 7-12 (2017) - [j44]Steve Mansfield-Devine:
A process of defence - securing industrial control systems. Netw. Secur. 2017(2): 14-19 (2017) - [j43]Steve Mansfield-Devine:
Fileless attacks: compromising targets without malware. Netw. Secur. 2017(4): 7-11 (2017) - [j42]Steve Mansfield-Devine:
Threat hunting: assuming the worst to strengthen resilience. Netw. Secur. 2017(5): 13-17 (2017) - [j41]Steve Mansfield-Devine:
Leaks and ransoms - the key threats to healthcare organisations. Netw. Secur. 2017(6): 14-19 (2017) - [j40]Steve Mansfield-Devine:
Adapting to the disappearing perimeter. Netw. Secur. 2017(8): 15-19 (2017) - [j39]Steve Mansfield-Devine:
Weaponising the Internet of Things. Netw. Secur. 2017(10): 13-19 (2017) - [j38]Steve Mansfield-Devine:
Going critical: attacks against national infrastructure. Netw. Secur. 2017(11): 16-19 (2017) - [j37]Steve Mansfield-Devine:
The right response: how organisations should react to security incidents. Netw. Secur. 2017(12): 16-19 (2017) - 2016
- [j36]Steve Mansfield-Devine:
Security guarantees: building credibility for security vendors. Netw. Secur. 2016(2): 14-18 (2016) - [j35]Steve Mansfield-Devine:
Your life in your hands: the security issues with healthcare apps. Netw. Secur. 2016(4): 14-18 (2016) - [j34]Steve Mansfield-Devine:
Creating security operations centres that work. Netw. Secur. 2016(5): 15-18 (2016) - [j33]Steve Mansfield-Devine:
The battle for privacy. Netw. Secur. 2016(6): 11-15 (2016) - [j32]Steve Mansfield-Devine:
Securing small and medium-size businesses. Netw. Secur. 2016(7): 14-20 (2016) - [j31]Steve Mansfield-Devine:
Ransomware: taking businesses hostage. Netw. Secur. 2016(10): 8-17 (2016) - [j30]Steve Mansfield-Devine:
DDoS goes mainstream: how headline-grabbing attacks could make this threat an organisation's biggest nightmare. Netw. Secur. 2016(11): 7-13 (2016) - [j29]Steve Mansfield-Devine:
Data classification: keeping track of your most precious asset. Netw. Secur. 2016(12): 10-15 (2016) - 2015
- [j28]Steve Mansfield-Devine:
Managing identity for a competitive edge. Netw. Secur. 2015(1): 14-18 (2015) - [j27]Steve Mansfield-Devine:
The privacy dilemma. Netw. Secur. 2015(2): 5-10 (2015) - [j26]Steve Mansfield-Devine:
The Ashley Madison affair. Netw. Secur. 2015(9): 8-16 (2015) - [j25]Steve Mansfield-Devine:
The growth and evolution of DDoS. Netw. Secur. 2015(10): 13-20 (2015) - [j24]Steve Mansfield-Devine:
When advertising turns nasty. Netw. Secur. 2015(11): 5-8 (2015) - [j23]Steve Mansfield-Devine:
Under the radar. Netw. Secur. 2015(12): 14-18 (2015) - 2014
- [j22]Steve Mansfield-Devine:
Interview: Corey Nachreiner, WatchGuard - security visibility. Netw. Secur. 2014(1): 11-15 (2014) - [j21]Steve Mansfield-Devine:
Building in security. Netw. Secur. 2014(7): 16-19 (2014) - [j20]Steve Mansfield-Devine:
Not coping with change. Netw. Secur. 2014(8): 14-17 (2014) - [j19]Steve Mansfield-Devine:
Hacking on an industrial scale. Netw. Secur. 2014(9): 12-16 (2014) - [j18]Steve Mansfield-Devine:
Masking sensitive data. Netw. Secur. 2014(10): 17-20 (2014) - [j17]Steve Mansfield-Devine:
Mobile security: it's all about behaviour. Netw. Secur. 2014(11): 16-20 (2014) - 2013
- [j16]Steve Mansfield-Devine:
Q&A: Colin Tankard - raising security awareness. Netw. Secur. 2013(6): 16-19 (2013) - [j15]Steve Mansfield-Devine:
Interview: Mick Ebsworth - a matter of trust. Netw. Secur. 2013(8): 11-13 (2013) - [j14]Steve Mansfield-Devine:
Interview: Jon Callas, Silent Circle. Netw. Secur. 2013(9): 17-20 (2013) - [j13]Steve Mansfield-Devine:
Interview: Seth Hallem, Mobile Helix - the right way to mobile security. Netw. Secur. 2013(10): 18-20 (2013) - [j12]Steve Mansfield-Devine:
Colin Tankard, Digital Pathways: confusion in the cloud. Netw. Secur. 2013(11): 17-20 (2013) - [j11]Steve Mansfield-Devine:
John Lyons, ICSPA: Resetting the clock on international co-operation. Netw. Secur. 2013(12): 12-15 (2013) - 2012
- [j10]Steve Mansfield-Devine:
Estonia: what doesn't kill you makes you stronger. Netw. Secur. 2012(7): 12-20 (2012) - [j9]Steve Mansfield-Devine:
Paranoid Android: just how insecure is the most popular mobile platform? Netw. Secur. 2012(9): 5-10 (2012) - [j8]Steve Mansfield-Devine:
Android architecture: attacking the weak points. Netw. Secur. 2012(10): 5-12 (2012) - [j7]Steve Mansfield-Devine:
Android malware and mitigations. Netw. Secur. 2012(11): 12-20 (2012) - 2011
- [j6]Steve Mansfield-Devine:
Anonymous: serious threat or mere annoyance? Netw. Secur. 2011(1): 4-10 (2011) - [j5]Steve Mansfield-Devine:
Hacktivism: assessing the damage. Netw. Secur. 2011(8): 5-13 (2011) - [j4]Steve Mansfield-Devine:
DDoS: threats and mitigation. Netw. Secur. 2011(12): 5-12 (2011) - 2010
- [j3]Steve Mansfield-Devine:
The perils of sharing. Netw. Secur. 2010(1): 11-13 (2010) - [j2]Steve Mansfield-Devine:
Divide and conquer: the threats posed by hybrid apps and HTML 5. Netw. Secur. 2010(3): 4-6 (2010) - [j1]Steve Mansfield-Devine:
Battle of the botnets. Netw. Secur. 2010(5): 4-6 (2010)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-11 01:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint