VOLUME 1, 2025
資通威脅的前景:發展及防禦 The Cyberthreat Horizon: Evolution and Defense
■ 專欄 Columns:
資訊安全議題:NIST CSF 2.0及資通安全層次結構
Information Security Matters: NIST CSF 2.0 and the Cybersecurity Hierarchy
數位信任規則:假設入侵以獲得優勢
The Digital Trust Imperative: Assume Breach to Gain Advantage
隱私實踐:道德與合規
Privacy in Practice: Ethics vs. Compliance
■ 推薦 Features:
在不斷演變的威脅環境中,資安領導者所面臨的挑戰
Cybersecurity Leadership Challenges in an Evolving Threat Landscape
採用自動化進行事件應變規劃
Employing Automation for Incident Response Planning
風險管理者的隱藏威脅
The Hidden Threat of the Risk Manager
從孫子兵法的領導策略贏得資通戰爭
Winning the Cyber War With Leadership Lessons from Sun Tzu
解析2023 Microsoft Exchange Online入侵事件的經驗教訓
Unlocking Lessons Learned From the 2023 Microsoft Exchange Online Intrusion
從神經科學觀點論人工智慧和資通安全
A Neuroscience Perspective on AI and Cybersecurity
以資通靭性的七大支柱制定資通策略
Developing a Cyberstrategy With the Seven Pillars of Cyberresilience
透過流程自動化轉換過時的支付系統
Transforming an Outdated Payment System Through Process Automation