ISSUE 53(March, 2017) How to leverage the benefits of open source software in a secure way Antivirus 2017: Security with a hint of surveillance Evolving PKI for the Internet of Things 7 real-world steps to security nirvana go to issue
ISSUE 52(December, 2016) SCADA cybersecurity: A long history of errors Healthcare security: Combating advanced threats Don’t let your security education and awareness to take the back seat The devil is in the details: What your metadata says about you. go to issue
ISSUE 51(September, 2016) Hacking is the new espionage New hyper-evasive threats are killing sandboxing as we know it How to choose a perfect data control solution for your enterprise What can Microsoft Patch Tuesday tell us about security trends in 2016? go to issue
ISSUE 50(June, 2016) Securing the future: Best practices for keeping corporate information safe during an M&A Executive hot seat: Ron Green, Executive VP, CISO at MasterCard 7 tips to get the absolute best price from security vendors How CISOs can bridge the gap between their organizations’ IT and security needs go to issue
ISSUE 49(February, 2016) Privacy by design: What it is and where to build it Harnessing artificial intelligence to build an army of virtual analysts Building and implementing an incident response program from scratch Take it to the boardroom: Elevating the cybersecurity discussion go to issue
ISSUE 48(December, 2015) Ivan Ristic and SSL Labs: How one man changed the way we understand SSL Review: Change and configuration auditing with Netwrix Auditor 7.0 How things change: Secure remote access to industrial control systems go to issue
ISSUE 47(September, 2015) Redefining security visualization with Hollywood UI design Best practices for ensuring compliance in the age of cloud computing The evolution of DDoS and how ISPs can respond NowSecure Lab cloud: Mobile app assessment environment go to issue
ISSUE 46(July, 2015) The Art of War applied to web application security Signature antivirus’ dirty little secret Review: Tresorit for Business Making IoT security a reality go to issue
ISSUE 45(March, 2015) How do we ensure the Security of Things in light of the Internet of Threats? Security and compliance: A balancing act of inequalities Which kind of security professional are you? The derived credential: delivering digital security to a mobile world go to issue