ISSUE 66(June, 2020)

  • Let’s be realistic about our expectations of AI
  • Full-time bug hunting: Pros and cons of an emerging career
  • Crowdsourced pentesting is not without its issues
go to issue

ISSUE 65.5(March, 2020)

More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center in San Francisco to explore the Human Element in cybersecurity through hundreds of keynote presentations, track sessions, tutorials, seminars and special events.

go to issue

ISSUE 65(February, 2020)

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue

    ISSUE 64(December, 2019)

    • Could audio warnings augment your ability to fight off cyberattacks?
    • Your supplier’s BEC problem is your BEC problem
    • Unmask cybercriminals through identity attribution
    • Want to build a SOC? Here is what you need to know beforehand
    go to issue

    ISSUE 63(September, 2019)

    • Identifying evasive threats hiding inside the network
    • Inside the NIST team working to make cybersecurity more user-friendly
    • Report: Black Hat USA 2019
    • Healthcare’s blind spot: Unmanaged IoT and medical devices
    go to issue

    ISSUE 62(June, 2019)

    • What’s your company’s risk exposure?
    • The modern threat landscape and expanding CISO challenges
    • Product showcase: Veriato Cerebral user & entity behavior analytics software
    • Building a modern data registry: Go beyond data classification
    go to issue

    ISSUE 61.5(March, 2019)

    RSA Conference, the world’s leading information security conferences and expositions, concluded its 28th annual event in San Francisco.

    go to issue

    ISSUE 61(February, 2019)

    • How to know when you’re ready for a fractional CISO
    • Debunking conventional wisdom to get out of the security and privacy rut
    • How accepting that your network will get hacked will help you develop a plan to recover faster
    • Four differences between the GDPR and the California Consumer Privacy Act
    go to issue

    ISSUE 60(December, 2018)

    • How to make the CFO your best cybersecurity friend
    • Review: Specops Password Policy
    • Break out of malware myopia by focusing on the fundamentals
    • Blind spots and how to see them: Observability in a serverless environment
    go to issue

    ISSUE 59(September, 2018)

    • The importance of career pathing in the cybersecurity industry
    • Fingerprinting HTTP anomalies to dissect malicious operations
    • How to keep cryptominers from opening up your IT container boxes
    • Report: Black Hat USA 2018
    go to issue

    ISSUE 58(June, 2018)

    • Is GDPR-regulated data lurking in unexpected pockets of your organization?
    • Leveraging security analytics to investigate and hunt modern threats
    • When was the last time your anti-virus software alerted you?
    go to issue