ISSUE 13 (September 2007)
Data leakage
Issue 13 Contributors
A. N. Ananth
co-founder and CEO of Prism Microsystems
Nitesh Dhanjani
Senior Director of Application Security Engineering
Jack Jones
Security expert
Vlatko Kosturjak
Security specialist
Rick Lawhorn
Principle of Information Security & Compliance at Data- line, Inc.
Samuel Linares
Senior security consultant and security manager with Tecnocom
Ulf T. Mattsson
CTO of Protegrity.
Andre Muscat
Director of Engineering at GFI Software
Ignacio Paredes
Senior security consultant with Tecnocom,
Rajender Singh
IT security consultant
Ari Takanen
Founder and CTO of Codenomicon Ltd.
Peter Thermos
Principal, Telcordia Technologies

Data leakage

PDF download
Read issue 13 now

Table of contents

  • Interview with Janne Uusilehto, Head of Nokia Product Security
  • Social engineering social networking services: a LinkedIn example
  • The case for automated log management in meeting HIPAA compliance
  • Risk decision making: whose call is it?
  • Interview with Zulfikar Ramzan, Senior Principal Researcher with the Advanced Threat Research team at Symantec
  • Securing VoIP networks: fraud
  • PCI DSS compliance: a difficult but necessary journey
  • A security focus on China outsourcing
  • A multi layered approach to prevent data leakage
  • Safeguard your organization with proper password management
  • Interview with Ulf Mattsson, Protegrity CTO
  • DEFCON 15
  • File format fuzzing
  • IS2ME: Information Security to Medium Enterprise

(IN)SECURE Magazine archive

ISSUE 66(June, 2020)

  • Let’s be realistic about our expectations of AI
  • Full-time bug hunting: Pros and cons of an emerging career
  • Crowdsourced pentesting is not without its issues
go to issue

ISSUE 65.5(March, 2020)

More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center in San Francisco to explore the Human Element in cybersecurity through hundreds of keynote presentations, track sessions, tutorials, seminars and special events.

go to issue

ISSUE 65(February, 2020)

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue