Prof Bill Buchanan B.Buchanan@napier.ac.uk
Professor
The current generation of threats against enterprise networks are more targeted, more persistent and more sophisticated than ever. Sony, eBay and JP Morgan are among the biggest names to fall victim in the last 12 months. The result is that massive amounts of personal data have been stolen in recent years and are now available to cybercriminals. This causes distress to consumers facing fraudulent charges and compromised cards, and enormous financial and reputational damage to the organisations that are hacked. To secure the future IT professionals need to be as sophisticated as the attacks they face and focus on prevention, detection and mitigation.
Buchanan, W. J. (2015, May). Vulnerability analysis. Presented at Advanced Threat Protection
Presentation Conference Type | Presentation / Talk |
---|---|
Conference Name | Advanced Threat Protection |
Start Date | May 14, 2015 |
End Date | May 14, 2015 |
Publication Date | May 14, 2015 |
Deposit Date | Aug 14, 2015 |
Peer Reviewed | Not Peer Reviewed |
Keywords | Cybersecurity; fraud; hacking; risk management; |
Public URL | http://researchrepository.napier.ac.uk/id/eprint/8765 |
Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains
(2024)
Journal Article
An omnidirectional approach to touch-based continuous authentication
(2023)
Journal Article
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
Apache License Version 2.0 (http://www.apache.org/licenses/)
Apache License Version 2.0 (http://www.apache.org/licenses/)
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search