ISSUE 20(March, 2009)

  • Improving network discovery mechanisms
  • Building a bootable BackTrack 4 thumb drive with persistent changes and Nessus
  • What you need to know about tokenization
go to issue

ISSUE 19(December, 2008)

  • The future of AV: looking for the good while stopping the bad
  • Eight holes in Windows login controls
  • Extended validation and online security: EV SSL gets the green light
  • Web filtering in a Web 2.0 world
go to issue

ISSUE 18(October, 2008)

  • Network and information security in Europe today
  • Browser security: bolt it on, then build it in
  • Passive network security analysis with NetworkMiner
  • Lynis – an introduction to UNIX system auditing
go to issue

ISSUE 17(July, 2008)

  • Open redirect vulnerabilities: definition and prevention
  • The future of security is information-centric
  • Securing the enterprise data flow against advanced attacks
  • Bypassing and enhancing live behavioral protection
go to issue

ISSUE 16(April, 2008)

  • Security policy considerations for virtual worlds
  • US political elections and cybercrime
  • Using packet analysis for network troubleshooting
  • The effectiveness of industry certifications
go to issue

ISSUE 15(February, 2008)

  • Proactive analysis of malware genes holds the key to network security
  • Advanced social engineering and human exploitation
  • Free visualization tools for security analysis and network monitoring
go to issue

ISSUE 13(September, 2007)

  • Interview with Janne Uusilehto, Head of Nokia Product Security
  • Social engineering social networking services: a LinkedIn example
  • The case for automated log management in meeting HIPAA compliance
  • Risk decision making: whose call is it?
go to issue

ISSUE 12(July, 2007)

  • Enterprise grade remote access
  • Review: Centennial Software DeviceWall 4.6
  • Solving the keylogger conundrum
  • Interview with Jeremiah Grossman, CTO of WhiteHat Security
go to issue

ISSUE 11(May, 2007)

  • On the security of e-passports
  • Review: GFI LANguard Network Security Scanner 8
  • Critical steps to secure your virtualized environment
  • Interview with Howard Schmidt, President and CEO R & H Security Consulting
go to issue

ISSUE 10(February, 2007)

  • Microsoft Windows Vista: significant security improvement?
  • Review: GFI Endpoint Security 3
  • Interview with Edward Gibson, Chief Security Advisor at Microsoft UK
  • Top 10 spyware of 2006
go to issue

ISSUE 9(December, 2006)

  • Effectiveness of security by admonition: a case study of security warnings in a web browser setting
  • Interview with Kurt Sauer, CSO at Skype
  • Web 2.0 defense with AJAX fingerprinting and filtering
go to issue