This website uses cookies to store information on your computer. Some of these cookies are used for visitor analysis, others are essential to making our site function properly and improve the user experience. By using this site, you consent to the placement of these cookies. Click Accept to consent and dismiss this message or Deny to leave this website. Read our Privacy Statement for more.
Contact Us   |   Print Page   |   Sign In   |   Join Now
The ISSA Journal

 

Contribute to the Journal:

Please contact the ISSA Journal Editor, and review in advance the Editorial Guidelines or the Open Forum Guidelines. Include the copyright release and submission checklist with your article. Published authors may be eligible for CPE credits.

Have you ever considered writing for publication? Would you find it helpful to bounce your ideas and concepts off other members who have published? Would it be helpful to get feedback on your draft? The Editorial Advisory Board will pair you with an experienced author. Sign up at Friends of Authors.

Interested in being a Friends of Authors mentor? See here for mentor guidance.

Advertise in the Journal: To learn about sponsorship opportunities, please contact Vendor Relations to request a Media Kit.

Meet the ISSA Journal Editorial Advisory Board.

Digital Archive for Members

Please click on the following journal issue links for access:
COMPUTER-Desktop/Laptop: Bluetoad | PDF; MOBILE-phone/tablet: iOS, Android ePub | Kindle Mobi


December 2019

Volume 17 - Issue 12

Feature articles include:

  • Mobile Devices and the Fifth Amendment | Jaret Langston, Dale W. Callahan, and Joseph Popinski
  • Taking a Holistic Approach to Security | Steve Kirby
  • Data Security: On Premise or in the Cloud | Ulf Mattsson
  • The Web PKI of the Future | Carl Mehner
  • The Python Programming Language: Relational Databases | Constantinos Doskas
  • ISSA Strategic Partner: ITSPmagazine: To the Moon and Back. Safely with Dr. Ron Ross; Unusual Gathering XXXV: Cybersecurity in Space and at Sea; An InfoSec Life: A Conversation with Chloé Messdaghi; A Conversation with Beverly Allen: ISSA International Summit 2019 Event Coverage
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Mobile Devices and the Fifth Amendment - at no charge or Join Now and gain full access to the ISSA Journal.


November 2019

Volume 17 - Issue 11

Feature articles include:

  • Secure DevOps before DevSecOps | Tony Rice
  • DevSecOps: A Systemic Approach for Secure Software Development | Seetharaman Jeganathan
  • Securing Terminology: Lessons from Interdisciplinary Research | Delmer Nagy, Herbert Gomez, and Christopher Copeland
  • Changing the DevOps Culture One Security Scan at a Time | Jon-Michael Lacek
  • The Python Programming Language: Relational Databases | Constantinos Doskas
  • ITSPmagazine Podcasts: A Fireside Chat with NIST Fellow Ron Ross during ISSA International Summit 2019; A Conversation with Vandana Verma; On Disability, Technology, and Flourishing | A Conversation with Joel M. Reynolds; MITRE ATT&CK—This Is Not Just Another Framework | A Conversation at the Edge with Katie Nickels, Fred Wilmot, and Ryan Kovar
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Secure DevOps before DevSecOps - at no charge or Join Now and gain full access to the ISSA Journal.


October 2019

Volume 17 - Issue 10

Feature articles include:

  • Immaturity and Moral Hazard in the Cyber Insurance Market | Kevin A. Sesock
  • The Role of Information Governance in Data Security | John C. Montaña
  • Cloud Provider Continuous Assurance: EU SEC Framework for Continuous Assurance in the Cloud | Dorian Knoblauch and Jim de Haas
  • The Python Programming Language: Relational Databases | Constantinos Doskas
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Immaturity and Moral Hazard in the Cyber Insurance Market - at no charge or Join Now and gain full access to the ISSA Journal.


September 2019

Volume 17 - Issue 9

Feature articles include:

  • NIST Ushers In a New Era of IT Risk Management | Stephen Berk
  • July 2019: The Month of Privacy? | Paul Lanois
  • Creating a Cyber Risk Intelligence Framework Integrating Best Practices and Standards | Jack Freund
  • The Python Programming Language: Relational Databases | Constantinos Doskas
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - NIST Ushers In a New Era of IT Risk Management - at no charge or Join Now and gain full access to the ISSA Journal.


August 2019

Volume 17 - Issue 8

Feature articles include:

  • Getting Started with Ghidra: The Software Reverse Engineering Tool from the NSA | Clara Andress and Jason Andress
  • Cybersecurity Education: The Quest to Building “Bridge” Skills | Andy Igonor, Ray Forbes, and Jonathan McCombs
  • Attackers Inside the Walls: Detecting Malicious Activity | Sean D. Goodwin
  • The Python Programming Language: Databases | Constantinos Doskas
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Getting Started with Ghidra: The Software Reverse Engineering Tool from the NSA - at no charge or Join Now and gain full access to the ISSA Journal.


July 2019

Volume 17 - Issue 7

Feature articles include:

  • Drone Hacking: Mirai in the Sky? |Clara Andress and Jason Andress
  • Robotic Process Automation Meets Identity and Access Management | Maria Schuett
  • Security Standards Participation | Jeff Stapleton and Phillip H. Griffin
  • OWASP: Application Security’s Best Friend | Kelley Bryant
  • The Python Programming Language: GUI #2 | Constantinos Doskas
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Drone Hacking: Mirai in the Sky? - at no charge or Join Now and gain full access to the ISSA Journal.


June 2019

Volume 17 - Issue 6

Feature articles include:

  • ISSA 2019 Election and Candidate Profiles
  • Smart Cities & Privacy | Paige M. Boshell
  • Privacy Preserving Blockchains | Phillip H. Griffin
  • Privacy Concerns of Smartphone Technology | Joab Kose
  • The Python Programming Language: GUI | Constantinos Doskas
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Smart Cities & Privacy - at no charge or Join Now and gain full access to the ISSA Journal.


May 2019

Volume 17 - Issue 5

Feature articles include:

  • Choosing Tokenization or Encryption | Jeff Stapleton
  • Trends in Security Executive Leadership and the Rise of the vCISO | Donna Gallaher
  • The Mathematics behind RSA Encryption | William C. Barge
  • Industrial Cybersecurity Enhancements | Cevn Vibert
  • NIST Cryptographic Algorithm and Module Validation Programs: Validating New Encryption Schemes | Eric Lankford
  • The Python Programming Language | Constantinos Doskas
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Choosing Tokenization or Encryption - at no charge or Join Now and gain full access to the ISSA Journal.


April 2019

Volume 17 - Issue 4

Feature articles include:

  • Building a Risk-Based Information Security Culture | Donald A. McKeown
  • Basic Principles of Database Security | John Gray
  • Protecting Information Assets against Insider Threats | T. Sean Kelly and Andrew Shaxted
  • A Classification and Comparative Analysis of Cyber Intrusion Detection Techniques | Liu Hua Yeo, Xiangdong Che, and Shalini Lakkaraju
  • The Python Programming Language | Constantinos Doskas
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Building a Risk-Based Information Security Culture - at no charge or Join Now and gain full access to the ISSA Journal.


March 2019

Volume 17 - Issue 3

Feature articles include:

  • Application Security, Ethics, & Eight-Year-Olds | Matt Wilgus
  • The Quest for Visibility and Control in the Cloud | Yuri Diogenes
  • Countering Gender Disparity: Creating Anti-Predictions Using Data Science | Lori L. Cole
  • Lost Cryptographics Keys – Lessons from Gerald Cotton | Steve Kirby
  • Anonymous Digital Signatures | Phillip H. Griffin
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - Application Security, Ethics, & Eight-Year-Olds - at no charge or Join Now and gain full access to the ISSA Journal.


February 2019

Volume 17 - Issue 2

Feature articles include:

  • California Dreaming – The Fight with the Federal Government over Technology | David R. Jackson
  • Bridging the Cyber Gap: Spotting Hidden Security Talent in Your Organization | Philip Casesa
  • SIEM Implementation for School Districts Utilizing FOSS | Alex Smith
  • Automation of Business-Aware Incident Management | Mariusz Stawowski
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - California Dreaming – The Fight with the Federal Government over Technology - at no charge or Join Now and gain full access to the ISSA Journal.


January 2019

Volume 17 - Issue 1

Feature articles include:

  • The Post Exploitation Malware Era | Meir Brown
  • How Cybersecurity Teams Can Support and Facilitate Compliance with the GDPR | Grace Buckler
  • Spoofing a Hardware Security Module | Jeff Stapleton
  • The Art of Pushing Left in Application Security | Kelley Bryant
  • Net Neutrality: What Is It and Is It Necessary? | Nima Zahadat
  • Practical Approaches to Overcome Security Challenges in Cloud Computing: Part 2: Private Cloud | Seetharaman Jeganathan
Members: please click on the following Journal issue links for access:
Computer: Bluetoad - PDF; Mobile: ePub - Mobi
Not a member? Read this month's feature article - The Post Exploitation Malware Era - at no charge or Join Now and gain full access to the ISSA Journal.



 

Community Search
Sign In


Calendar

1/22/2020
ISSA Thought Leadership Series: The Asset Management Resurgence

2/22/2020 » 2/23/2020
February 2020 ISSA Cyber Executive Forum San Francisco, CA




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information