This website uses cookies to store information on your computer. Some of these cookies are used for visitor analysis, others are essential to making our site function properly and improve the user experience. By using this site, you consent to the placement of these cookies. Click Accept to consent and dismiss this message or Deny to leave this website. Read our Privacy Statement for more.
Contact Us   |   Print Page   |   Sign In   |   Join Now
The ISSA Journal

 

Contribute to the Journal:

Please contact the ISSA Journal Editor, and review in advance the Editorial Guidelines or the Open Forum Guidelines. Include the copyright release and submission checklist with your article. Published authors may be eligible for CPE credits.

Have you ever considered writing for publication? Would you find it helpful to bounce your ideas and concepts off other members who have published? Would it be helpful to get feedback on your draft? The Editorial Advisory Board will pair you with an experienced author. Sign up at Friends of Authors.

Interested in being a Friends of Authors mentor? See here for mentor guidance.

Advertise in the Journal: To learn about sponsorship opportunities, please contact Vendor Relations to request a Media Kit.

Meet the ISSA Journal Editorial Advisory Board.

Digital Archive for Members

Please click on the following journal issue links for access:
COMPUTER-Desktop/Laptop: Bluetoad | PDF; MOBILE-phone/tablet: iOS, Android ePub | Kindle Mobi


October 2019

Volume 17 - Issue 10

Feature articles include:

  • Immaturity and Moral Hazard in the Cyber Insurance Market | Kevin A. Sesock
  • The Role of Information Governance in Data Security | John C. Montaña
  • Cloud Provider Continuous Assurance: EU SEC Framework for Continuous Assurance in the Cloud | Dorian Knoblauch and Jim de Haas
  • The Python Programming Language: Relational Databases | Constantinos Doskas
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Immaturity and Moral Hazard in the Cyber Insurance Market - at no charge or Join Now and gain full access to the ISSA Journal.


September 2019

Volume 17 - Issue 9

Feature articles include:

  • NIST Ushers In a New Era of IT Risk Management | Stephen Berk
  • July 2019: The Month of Privacy? | Paul Lanois
  • Creating a Cyber Risk Intelligence Framework Integrating Best Practices and Standards | Jack Freund
  • The Python Programming Language: Relational Databases | Constantinos Doskas
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - NIST Ushers In a New Era of IT Risk Management - at no charge or Join Now and gain full access to the ISSA Journal.


August 2019

Volume 17 - Issue 8

Feature articles include:

  • Getting Started with Ghidra: The Software Reverse Engineering Tool from the NSA | Clara Andress and Jason Andress
  • Cybersecurity Education: The Quest to Building “Bridge” Skills | Andy Igonor, Ray Forbes, and Jonathan McCombs
  • Attackers Inside the Walls: Detecting Malicious Activity | Sean D. Goodwin
  • The Python Programming Language: Databases | Constantinos Doskas
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Getting Started with Ghidra: The Software Reverse Engineering Tool from the NSA - at no charge or Join Now and gain full access to the ISSA Journal.


July 2019

Volume 17 - Issue 7

Feature articles include:

  • Drone Hacking: Mirai in the Sky? |Clara Andress and Jason Andress
  • Robotic Process Automation Meets Identity and Access Management | Maria Schuett
  • Security Standards Participation | Jeff Stapleton and Phillip H. Griffin
  • OWASP: Application Security’s Best Friend | Kelley Bryant
  • The Python Programming Language: GUI #2 | Constantinos Doskas
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Drone Hacking: Mirai in the Sky? - at no charge or Join Now and gain full access to the ISSA Journal.


June 2019

Volume 17 - Issue 6

Feature articles include:

  • ISSA 2019 Election and Candidate Profiles
  • Smart Cities & Privacy | Paige M. Boshell
  • Privacy Preserving Blockchains | Phillip H. Griffin
  • Privacy Concerns of Smartphone Technology | Joab Kose
  • The Python Programming Language: GUI | Constantinos Doskas
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Smart Cities & Privacy - at no charge or Join Now and gain full access to the ISSA Journal.


May 2019

Volume 17 - Issue 5

Feature articles include:

  • Choosing Tokenization or Encryption | Jeff Stapleton
  • Trends in Security Executive Leadership and the Rise of the vCISO | Donna Gallaher
  • The Mathematics behind RSA Encryption | William C. Barge
  • Industrial Cybersecurity Enhancements | Cevn Vibert
  • NIST Cryptographic Algorithm and Module Validation Programs: Validating New Encryption Schemes | Eric Lankford
  • The Python Programming Language | Constantinos Doskas
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Choosing Tokenization or Encryption - at no charge or Join Now and gain full access to the ISSA Journal.


April 2019

Volume 17 - Issue 4

Feature articles include:

  • Building a Risk-Based Information Security Culture | Donald A. McKeown
  • Basic Principles of Database Security | John Gray
  • Protecting Information Assets against Insider Threats | T. Sean Kelly and Andrew Shaxted
  • A Classification and Comparative Analysis of Cyber Intrusion Detection Techniques | Liu Hua Yeo, Xiangdong Che, and Shalini Lakkaraju
  • The Python Programming Language | Constantinos Doskas
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Building a Risk-Based Information Security Culture - at no charge or Join Now and gain full access to the ISSA Journal.


March 2019

Volume 17 - Issue 3

Feature articles include:

  • Application Security, Ethics, & Eight-Year-Olds | Matt Wilgus
  • The Quest for Visibility and Control in the Cloud | Yuri Diogenes
  • Countering Gender Disparity: Creating Anti-Predictions Using Data Science | Lori L. Cole
  • Lost Cryptographics Keys – Lessons from Gerald Cotton | Steve Kirby
  • Anonymous Digital Signatures | Phillip H. Griffin
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Application Security, Ethics, & Eight-Year-Olds - at no charge or Join Now and gain full access to the ISSA Journal.


February 2019

Volume 17 - Issue 2

Feature articles include:

  • California Dreaming – The Fight with the Federal Government over Technology | David R. Jackson
  • Bridging the Cyber Gap: Spotting Hidden Security Talent in Your Organization | Philip Casesa
  • SIEM Implementation for School Districts Utilizing FOSS | Alex Smith
  • Automation of Business-Aware Incident Management | Mariusz Stawowski
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - California Dreaming – The Fight with the Federal Government over Technology - at no charge or Join Now and gain full access to the ISSA Journal.


January 2019

Volume 17 - Issue 1

Feature articles include:

  • The Post Exploitation Malware Era | Meir Brown
  • How Cybersecurity Teams Can Support and Facilitate Compliance with the GDPR | Grace Buckler
  • Spoofing a Hardware Security Module | Jeff Stapleton
  • The Art of Pushing Left in Application Security | Kelley Bryant
  • Net Neutrality: What Is It and Is It Necessary? | Nima Zahadat
  • Practical Approaches to Overcome Security Challenges in Cloud Computing: Part 2: Private Cloud | Seetharaman Jeganathan
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - The Post Exploitation Malware Era - at no charge or Join Now and gain full access to the ISSA Journal.


December 2018

Volume 16 - Issue 12

Feature articles include:

  • The Future of IT Risk Management Will Be Quantified | Jack Freund
  • Our Journey in Phishing Mitigation | Jennifer Kinney and Aurobindo Sundaram
  • The Impact of Cryptocurrency on Modern-Day Cybercrime | Michael Doran
  • Practical Approaches to Overcome Security Challenges in Cloud Computing | Seetharaman Jeganathan
  • Did GDPR Revoke the Digital Certificate? | Jeff Stapleton and Stephen Wu
  • Staring Down the Future of Cloud Computing | Tim O’Neal
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - The Future of IT Risk Management Will Be Quantified - at no charge or Join Now and gain full access to the ISSA Journal.


November 2018

Volume 16 - Issue 11

Feature articles include:

  • Malware: Cat and Mouse Forever? | Ken Dunham
  • Pulling Back the Privacy Curtain | Reg Harnish
  • Holistic Approach to Enhance Your Security Posture | Yuri Diogenes
  • A Look at the Espionage Act of 1917 for the Internet Age | Whitney Partridge and Nima Zahadat
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Malware: Cat and Mouse Forever? - at no charge or Join Now and gain full access to the ISSA Journal.



 

Community Search
Sign In


Calendar

10/16/2019
ISSA : Top Five Ways to Identify Automated Attacks to Your Website and Mobile Applications

10/16/2019
ISSA Los Angeles Monthly Meeting Oct 2019

10/22/2019
ISSA International Series: Attack of the BotNets- Internet of Terror loT

11/6/2019
The Persistent Pernicious Myths and Hidden Truths of Cybersecurity




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information