ISSUE 13 (September 2007)
Data leakage
ISSUE 13
Issue 13 Contributors
A. N. Ananth
co-founder and CEO of Prism Microsystems
Nitesh Dhanjani
Senior Director of Application Security Engineering
Jack Jones
Security expert
Vlatko Kosturjak
Security specialist
Rick Lawhorn
Principle of Information Security & Compliance at Data- line, Inc.
Samuel Linares
Senior security consultant and security manager with Tecnocom
Ulf T. Mattsson
CTO of Protegrity.
Andre Muscat
Director of Engineering at GFI Software
Ignacio Paredes
Senior security consultant with Tecnocom,
Rajender Singh
IT security consultant
Ari Takanen
Founder and CTO of Codenomicon Ltd.
Peter Thermos
Principal, Telcordia Technologies

Data leakage

PDF download
Read issue 13 now
Share

Table of contents

  • Interview with Janne Uusilehto, Head of Nokia Product Security
  • Social engineering social networking services: a LinkedIn example
  • The case for automated log management in meeting HIPAA compliance
  • Risk decision making: whose call is it?
  • Interview with Zulfikar Ramzan, Senior Principal Researcher with the Advanced Threat Research team at Symantec
  • Securing VoIP networks: fraud
  • PCI DSS compliance: a difficult but necessary journey
  • A security focus on China outsourcing
  • A multi layered approach to prevent data leakage
  • Safeguard your organization with proper password management
  • Interview with Ulf Mattsson, Protegrity CTO
  • DEFCON 15
  • File format fuzzing
  • IS2ME: Information Security to Medium Enterprise

(IN)SECURE Magazine archive More →

ISSUE 72(July, 2022 )
  • 7 threat detection challenges CISOs face and what they can do about it
  • How to set up a powerful insider threat program
  • An offensive mindset is crucial for effective cyber defense
go to issue
ISSUE 71.5(June, 2022 )

Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and more.

go to issue
ISSUE 71(March, 2022 )
  • Why security strategies need a new perspective
  • The evolution of security analytics
  • Open-source code: How to stay secure while moving fast
go to issue