ISSUE 13 (September 2007)
Data leakage
Issue 13 Contributors
A. N. Ananth
co-founder and CEO of Prism Microsystems
Nitesh Dhanjani
Senior Director of Application Security Engineering
Jack Jones
Security expert
Vlatko Kosturjak
Security specialist
Rick Lawhorn
Principle of Information Security & Compliance at Data- line, Inc.
Samuel Linares
Senior security consultant and security manager with Tecnocom
Ulf T. Mattsson
CTO of Protegrity.
Andre Muscat
Director of Engineering at GFI Software
Ignacio Paredes
Senior security consultant with Tecnocom,
Rajender Singh
IT security consultant
Ari Takanen
Founder and CTO of Codenomicon Ltd.
Peter Thermos
Principal, Telcordia Technologies

Data leakage

PDF download
Read issue 13 now

Table of contents

  • Interview with Janne Uusilehto, Head of Nokia Product Security
  • Social engineering social networking services: a LinkedIn example
  • The case for automated log management in meeting HIPAA compliance
  • Risk decision making: whose call is it?
  • Interview with Zulfikar Ramzan, Senior Principal Researcher with the Advanced Threat Research team at Symantec
  • Securing VoIP networks: fraud
  • PCI DSS compliance: a difficult but necessary journey
  • A security focus on China outsourcing
  • A multi layered approach to prevent data leakage
  • Safeguard your organization with proper password management
  • Interview with Ulf Mattsson, Protegrity CTO
  • DEFCON 15
  • File format fuzzing
  • IS2ME: Information Security to Medium Enterprise

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue