Who's Behind Your cyber attack?
Why attributing cybersecurity incidents is a significant challenge
How to use
Cybersecurity expertise for more than just experts
Issue 5
Spring 2018
How to use
Desktop
To navigate through the magazine use the on-screen page arrows or the right and left arrow keys on your keyboard. Use your mouse wheel or the scrollbars to read through each article.
On the bottom right of the page there are three menu buttons: home, contents and full screen. To return to this cover page you can either use the home or contents buttons, or click on the Verdict Encrypt logo at the top of each article.
Tablet and mobile
To navigate through the magazine, simply swipe right and left, or tap on the page arrows. To read an article, swipe up.
On tablets there are two menu buttons on the bottom right: home and contents. On mobile devices there is only contents.
To get back to the cover, either click home or the Verdict Encrypt logo located at the top of each article.
Crisis Management: Handling a Data Breach in a Post-GDPR World
“All Wars are Going to Begin as Cyber Wars”: Google Jigsaw's Jared Cohen
Going Dark: North Korea’s Dramatic Increase in Cyber Secrecy
The Virtual DPO: A Compelling Alternative for GDPR Compliance
Security for Convenience: the Case Against Logging In with Facebook