ISSUE 52(December, 2016)

  • SCADA cybersecurity: A long history of errors
  • Healthcare security: Combating advanced threats
  • Don’t let your security education and awareness to take the back seat
  • The devil is in the details: What your metadata says about you.
go to issue

ISSUE 51(September, 2016)

  • Hacking is the new espionage
  • New hyper-evasive threats are killing sandboxing as we know it
  • How to choose a perfect data control solution for your enterprise
  • What can Microsoft Patch Tuesday tell us about security trends in 2016?
go to issue

ISSUE 50(June, 2016)

  • Securing the future: Best practices for keeping corporate information safe during an M&A
  • Executive hot seat: Ron Green, Executive VP, CISO at MasterCard
  • 7 tips to get the absolute best price from security vendors
  • How CISOs can bridge the gap between their organizations’ IT and security needs
go to issue

ISSUE 49(February, 2016)

  • Privacy by design: What it is and where to build it
  • Harnessing artificial intelligence to build an army of virtual analysts
  • Building and implementing an incident response program from scratch
  • Take it to the boardroom: Elevating the cybersecurity discussion
go to issue

ISSUE 48(December, 2015)

  • Ivan Ristic and SSL Labs: How one man changed the way we understand SSL
  • Review: Change and configuration auditing with Netwrix Auditor 7.0
  • How things change: Secure remote access to industrial control systems
go to issue

ISSUE 47(September, 2015)

  • Redefining security visualization with Hollywood UI design
  • Best practices for ensuring compliance in the age of cloud computing
  • The evolution of DDoS and how ISPs can respond
  • NowSecure Lab cloud: Mobile app assessment environment
go to issue

ISSUE 46(July, 2015)

  • The Art of War applied to web application security
  • Signature antivirus’ dirty little secret
  • Review: Tresorit for Business
  • Making IoT security a reality
go to issue

ISSUE 45(March, 2015)

  • How do we ensure the Security of Things in light of the Internet of Threats?
  • Security and compliance: A balancing act of inequalities
  • Which kind of security professional are you?
  • The derived credential: delivering digital security to a mobile world
go to issue

ISSUE 44(December, 2014)

  • The five stages of security grief
  • Infosec industry: Time to put up or shut up
  • Review: Secure file storage and sharing with nCrypted Cloud
  • Prioritizing penetration testing
go to issue