ISSUE 12 (July 2007)
PCI compliance
ISSUE 12
Issue 12 Contributors
Jonathan Austin
security manager at a healthcare provider
David Beesley
managing director of IT security consultancy Network Defence
Jason Chan
LogLogic’s Director of Product Management for Applications.
Sacha Chahrvin
UK managing director of SmartLine
Rob P. Faber
infrastructure architect, consultant and senior engineer
Vladimir Jirasek
Head of System Security at T-Mobile UK
Calum MacLeod
Leader of Cyber-Ark business in Europe and Africa
Ulf T. Mattsson
CTO of Protegrity

PCI compliance

PDF download
Read issue 12 now
Share

Table of contents

  • Enterprise grade remote access
  • Review: Centennial Software DeviceWall 4.6
  • Solving the keylogger conundrum
  • Interview with Jeremiah Grossman, CTO of WhiteHat Security
  • The role of log management in operationalizing PCI compliance
  • Windows security: how to act against common attack vectors
  • Taking ownership of the Trusted Platform Module chip on Intel Macs
  • Compliance, IT security and a clear conscience
  • Key management for enterprise data encryption
  • The menace within
  • A closer look at the Cisco CCNP Video Mentor
  • Network Access Control

(IN)SECURE Magazine archive

ISSUE 66(June, 2020)

  • Let’s be realistic about our expectations of AI
  • Full-time bug hunting: Pros and cons of an emerging career
  • Crowdsourced pentesting is not without its issues
go to issue

ISSUE 65.5(March, 2020)

More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center in San Francisco to explore the Human Element in cybersecurity through hundreds of keynote presentations, track sessions, tutorials, seminars and special events.

go to issue

ISSUE 65(February, 2020)

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue