ISSUE 26(November, 2010) Database protocol exploits explained Measuring web application security coverage Inside backup and storage: The expert’s view go to issue
ISSUE 27(September, 2010) Review: BlockMaster SafeStick secure USB flash drive The devil is in the details: Securing the enterprise against the cloud Cybercrime may be on the rise, but authentication evolves to defeat it go to issue
ISSUE 26(June, 2010) PCI: Security’s lowest common denominator Analyzing Flash-based RIA components and discovering vulnerabilities Logs: Can we finally tame the beast? go to issue
ISSUE 25(April, 2010) The changing face of penetration testing: Evolve or die! Cloud computing and recovery, not just backup EJBCA: Make your own certificate authority Advanced attack detection using OSSIM go to issue
ISSUE 24(February, 2010) Writing a secure SOAP client with PHP: Field report from a real-world project How virtualized browsing shields against web-based attacks Preparing a strategy for application vulnerability detection Threats 2.0: A glimpse into the near future go to issue
ISSUE 23(November, 2009) Microsoft’s security patches year in review: A malware researcher’s perspective A closer look at Red Condor Hosted Service Study uncovers alarming password usage behavior Elevating email to an enterprise-class database application solution go to issue
ISSUE 22(September, 2009) Using real-time events to drive your network scans The Nmap project: Open source with style A look at geolocation, URL shortening and top Twitter threats Review: Data Locker go to issue
ISSUE 21(June, 2009) Malicious PDF: Get owned without opening Review: IronKey Personal Windows 7 security features: Building on Vista Using Wireshark to capture and analyze wireless traffic go to issue
ISSUE 20(March, 2009) Improving network discovery mechanisms Building a bootable BackTrack 4 thumb drive with persistent changes and Nessus What you need to know about tokenization go to issue
ISSUE 19(December, 2008) The future of AV: looking for the good while stopping the bad Eight holes in Windows login controls Extended validation and online security: EV SSL gets the green light Web filtering in a Web 2.0 world go to issue
ISSUE 18(October, 2008) Network and information security in Europe today Browser security: bolt it on, then build it in Passive network security analysis with NetworkMiner Lynis – an introduction to UNIX system auditing go to issue
ISSUE 17(July, 2008) Open redirect vulnerabilities: definition and prevention The future of security is information-centric Securing the enterprise data flow against advanced attacks Bypassing and enhancing live behavioral protection go to issue