Cybersecurity in 2018:
AI, Blockchain and the IoT
Experts predict the state of cybersecurity in the coming year
How to use
Cybersecurity expertise for more than just experts
How to use
To navigate through the magazine use the on-screen page arrows or the right and left arrow keys on your keyboard. Use your mouse wheel or the scrollbars to read through each article.
On the bottom right of the page there are three menu buttons: home, contents and full screen. To return to this cover page you can either use the home or contents buttons, or click on the Verdict Encrypt logo at the top of each article.
Tablet and mobile
To navigate through the magazine, simply swipe right and left, or tap on the page arrows. To read an article, swipe up.
On tablets there are two menu buttons on the bottom right: home and contents. On mobile devices there is only contents.
To get back to the cover, either click home or the Verdict Encrypt logo located at the top of each article.
Circling the Abyss: Why Small Businesses Should Fear Cyberattacks
Is Your Company's Cybersecurity Training Fit for Purpose?
Preventing the Impossible: The Inevitability of Critical Infrastructure Attacks
In Focus: The Revival of The UK Cyber Demonstration Centre
Machine Learning in Cybersecurity: The Road to Reality?