ISSUE 48(December, 2015) Ivan Ristic and SSL Labs: How one man changed the way we understand SSL Review: Change and configuration auditing with Netwrix Auditor 7.0 How things change: Secure remote access to industrial control systems go to issue
ISSUE 47(September, 2015) Redefining security visualization with Hollywood UI design Best practices for ensuring compliance in the age of cloud computing The evolution of DDoS and how ISPs can respond NowSecure Lab cloud: Mobile app assessment environment go to issue
ISSUE 46(July, 2015) The Art of War applied to web application security Signature antivirus’ dirty little secret Review: Tresorit for Business Making IoT security a reality go to issue
ISSUE 45(March, 2015) How do we ensure the Security of Things in light of the Internet of Threats? Security and compliance: A balancing act of inequalities Which kind of security professional are you? The derived credential: delivering digital security to a mobile world go to issue
ISSUE 44(December, 2014) The five stages of security grief Infosec industry: Time to put up or shut up Review: Secure file storage and sharing with nCrypted Cloud Prioritizing penetration testing go to issue
ISSUE 43(September, 2014) How to tell if your security system has been fingerprinted by evasive malware Mobile hackers look to the network Why every security-conscious organization needs a honeypot Securing the U.S. electrical grid go to issue
ISSUE 42(June, 2014) Six infosec tips I learned from Game of Thrones Dissecting the newly-discovered desire for control and privacy Incident response and failure of the “Just Fix It” attitude How to learn information security go to issue
ISSUE 41(February, 2014) Cloud insecurity? Time to bust the myth Executive hot seat: Cloud Security Alliance CEO Security uncertainty in the cloud: Problems and potential solutions Share with the world: Who reads my data in the cloud? go to issue
ISSUE 40(December, 2013) How malware became the cyber threat it is today Testing anti-malware products Shoulder surfing via audio frequencies for XBox Live passwords How to write Yara rules to detect malware go to issue