This website uses cookies to store information on your computer. Some of these cookies are used for visitor analysis, others are essential to making our site function properly and improve the user experience. By using this site, you consent to the placement of these cookies. Click Accept to consent and dismiss this message or Deny to leave this website. Read our Privacy Statement for more.
Print Page | Contact Us | Sign In | Join Now
The ISSA Journal

 

Contribute to the Journal:

Please contact the ISSA Journal Editor, and review in advance the Editorial Guidelines or the Open Forum Guidelines. Include the copyright release and submission checklist with your article. Published authors may be eligible for CPE credits.

Have you ever considered writing for publication? Would you find it helpful to bounce your ideas and concepts off other members who have published? Would it be helpful to get feedback on your draft? The Editorial Advisory Board will pair you with an experienced author. Sign up at Friends of Authors.

Interested in being a Friends of Authors mentor? See here for mentor guidance.

Advertise in the Journal: To learn about sponsorship opportunities, please contact Vendor Relations to request a Media Kit.

Meet the ISSA Journal Editorial Advisory Board.

Digital Archive for Members

Please click on the following journal issue links for access:
COMPUTER-Desktop/Laptop: Bluetoad | PDF; MOBILE-phone/tablet: iOS, Android ePub | Kindle Mobi


May 2020

Volume 18 - Issue 5

Feature articles include:

  • Quantum Cryptography: Myths, Legends, and Hypothesis | Jeff Stapleton
  • Quantum Computing and the Future Internet | Tajdar Jawaid
  • Data Privacy: De-Identification Techniques | Ulf Mattsson
  • Quantum Cryptology: The Good, the Bad, and the Likely | Frank Gearhart
  • The Python Programming: Processing NVD Data | Constantinos Doskas
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Quantum Cryptography: Myths, Legends, and Hypothesis - at no charge or Join Now and gain full access to the ISSA Journal.


April 2020

Volume 18 - Issue 4

Feature articles include:

  • The Ethical Use of Machine Learning in Cybersecurity | Frank Gearhart
  • Leveraging and Building CSIRT Units | Gilad Maayan
  • Cyber Resilience: A Blueprint for Success in the Global Digital Era | Michael Doran
  • Managing Remote Iot Platforms for Operational Tasks | Dale E. Drummond
  • The Python Programming Language: Relational Databases | Constantinos Doskas – ISSA Senior Member, Northern Virginia Chapter
  • ISSA Strategic Partner - ITSPmagazine: Working from Home - Let's Talk About It | 5G: The Impact of Speed and Scale on Security and Privacy | A Day in the Life of a SOC Analyst | Underrepresented Episode II
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - The Ethical Use of Machine Learning in Cybersecurity - at no charge or Join Now and gain full access to the ISSA Journal.


March 2020

Volume 18 - Issue 3

Feature articles include:

  • Measuring Security Effectiveness: A Critical Requirement for Cybersecurity Leaders | Matt Hartley
  • An Overview of Voice Authentication | Nima Zahadat
  • How To Pay and Grow Talent in a Digital World | David Foote
  • Improving Cybersecurity Processes | Mark Abrams
  • The Python Programming Language: Relational Databases | Constantinos Doskas
  • ISSA Strategic Partner - ITSPmagazine: A Day in the Life of a Bug Bounty Hunter | The Role of Lifelong Learning in InfoSec | An InfoSec Life | The Uncommon Journey Talk Show
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Measuring Security Effectiveness: A Critical Requirement for Cybersecurity Leaders - at no charge or Join Now and gain full access to the ISSA Journal.


February 2020

Volume 18 - Issue 2

Feature articles include:

  • Offensive Cyber Operations Abroad Influence US Congressional Legislation | Lori Cole and Kory Fear
  • Cyber Trends of 2019 and What They Mean for 2020 | Mamady Konneh and Jeremy Swenson
  • Cyber Professionals Can Be the Best Cyber Teachers | Brian Ngac
  • Detecting Server-Side Request Forgery Attacks on Amazon Web Services | Sean McElroy
  • The Python Programming Language: Relational Databases | Constantinos Doskas
  • ISSA Strategic Partner - ITSPmagazine: What's the Difference between AppSec and DevSecOps | At the Edge with Vandana Verma and Francesco Cipollone; The Future of Privacy: Trends in 2020 You Can't Ignore | At the Edge; An InfoSec Life | A Conversation with Nia Luckey; Mission Critical with Karen Worstell | Episode VII | Athena Rising
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Offensive Cyber Operations Abroad Influence US Congressional Legislation - at no charge or Join Now and gain full access to the ISSA Journal.


January 2020

Volume 18 - Issue 1

Feature articles include:

  • NIST Ushers in a New Era of IT Risk Management | Stephen Berk
  • Countering Gender Disparity: Creating Anti-Predictions Using Data Science | Lori L. Cole
  • Smart Cities and Privacy | Paige M. Boshell
  • Immaturity and Moral Hazard in the Cyber Insurance Market | Kevin A. Sesock
  • Drone Hacking: Mirai in the Sky? | Clara Andress and Jason Andress
  • ISSA Strategic Partner - ITSPmagazine: The Future of Technology & Society | Time Traveling with Friends: 1840–2200; What Is SecOps’ Role in Protecting the Employee at Home? | At The Edge; An InfoSec Life | A Conversation with Phillip Wylie; A Conversation with Jinan Budge | Forrester Cybersecurity Predictions 2020
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - NIST Ushers in a New Era of IT Risk Management - at no charge or Join Now and gain full access to the ISSA Journal.


December 2019

Volume 17 - Issue 12

Feature articles include:

  • Mobile Devices and the Fifth Amendment | Jaret Langston, Dale W. Callahan, and Joseph Popinski
  • Taking a Holistic Approach to Security | Steve Kirby
  • Data Security: On Premise or in the Cloud | Ulf Mattsson
  • The Web PKI of the Future | Carl Mehner
  • The Python Programming Language: Relational Databases | Constantinos Doskas
  • ISSA Strategic Partner: ITSPmagazine: To the Moon and Back. Safely with Dr. Ron Ross; Unusual Gathering XXXV: Cybersecurity in Space and at Sea; An InfoSec Life: A Conversation with Chloé Messdaghi; A Conversation with Beverly Allen: ISSA International Summit 2019 Event Coverage
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Mobile Devices and the Fifth Amendment - at no charge or Join Now and gain full access to the ISSA Journal.


November 2019

Volume 17 - Issue 11

Feature articles include:

  • Secure DevOps before DevSecOps | Tony Rice
  • DevSecOps: A Systemic Approach for Secure Software Development | Seetharaman Jeganathan
  • Securing Terminology: Lessons from Interdisciplinary Research | Delmer Nagy, Herbert Gomez, and Christopher Copeland
  • Changing the DevOps Culture One Security Scan at a Time | Jon-Michael Lacek
  • The Python Programming Language: Relational Databases | Constantinos Doskas
  • ITSPmagazine Podcasts: A Fireside Chat with NIST Fellow Ron Ross during ISSA International Summit 2019; A Conversation with Vandana Verma; On Disability, Technology, and Flourishing | A Conversation with Joel M. Reynolds; MITRE ATT&CK—This Is Not Just Another Framework | A Conversation at the Edge with Katie Nickels, Fred Wilmot, and Ryan Kovar
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Secure DevOps before DevSecOps - at no charge or Join Now and gain full access to the ISSA Journal.


October 2019

Volume 17 - Issue 10

Feature articles include:

  • Immaturity and Moral Hazard in the Cyber Insurance Market | Kevin A. Sesock
  • The Role of Information Governance in Data Security | John C. Montaña
  • Cloud Provider Continuous Assurance: EU SEC Framework for Continuous Assurance in the Cloud | Dorian Knoblauch and Jim de Haas
  • The Python Programming Language: Relational Databases | Constantinos Doskas
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Immaturity and Moral Hazard in the Cyber Insurance Market - at no charge or Join Now and gain full access to the ISSA Journal.


September 2019

Volume 17 - Issue 9

Feature articles include:

  • NIST Ushers In a New Era of IT Risk Management | Stephen Berk
  • July 2019: The Month of Privacy? | Paul Lanois
  • Creating a Cyber Risk Intelligence Framework Integrating Best Practices and Standards | Jack Freund
  • The Python Programming Language: Relational Databases | Constantinos Doskas
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - NIST Ushers In a New Era of IT Risk Management - at no charge or Join Now and gain full access to the ISSA Journal.


August 2019

Volume 17 - Issue 8

Feature articles include:

  • Getting Started with Ghidra: The Software Reverse Engineering Tool from the NSA | Clara Andress and Jason Andress
  • Cybersecurity Education: The Quest to Building “Bridge” Skills | Andy Igonor, Ray Forbes, and Jonathan McCombs
  • Attackers Inside the Walls: Detecting Malicious Activity | Sean D. Goodwin
  • The Python Programming Language: Databases | Constantinos Doskas
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Getting Started with Ghidra: The Software Reverse Engineering Tool from the NSA - at no charge or Join Now and gain full access to the ISSA Journal.


July 2019

Volume 17 - Issue 7

Feature articles include:

  • Drone Hacking: Mirai in the Sky? |Clara Andress and Jason Andress
  • Robotic Process Automation Meets Identity and Access Management | Maria Schuett
  • Security Standards Participation | Jeff Stapleton and Phillip H. Griffin
  • OWASP: Application Security’s Best Friend | Kelley Bryant
  • The Python Programming Language: GUI #2 | Constantinos Doskas
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Drone Hacking: Mirai in the Sky? - at no charge or Join Now and gain full access to the ISSA Journal.


June 2019

Volume 17 - Issue 6

Feature articles include:

  • ISSA 2019 Election and Candidate Profiles
  • Smart Cities & Privacy | Paige M. Boshell
  • Privacy Preserving Blockchains | Phillip H. Griffin
  • Privacy Concerns of Smartphone Technology | Joab Kose
  • The Python Programming Language: GUI | Constantinos Doskas
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Smart Cities & Privacy - at no charge or Join Now and gain full access to the ISSA Journal.



 

Management
  • Cyber Executive Members
  • Guy Wiltse
  • Email Guy
  • Member Services
  • Kaite Cox
  • 1 (703) 382-8205
  • Email Kaite
  • Sales / Sponsorships
  • Lisa O'Connell
  • 1 (703) 382-8196
  • Email Lisa
ISSA

Information Systems Security Association, Inc.

1964 Gallows Road Suite 210

Vienna, VA. 22182

Fax: (703) 356-7096

Email ISSA

Copyright © 2020 ISSA International | All Rights Reserved