ISSUE 15 (February 2008)
Issue 15 Contributors
Sam Abbott-McCune
Anthony Arrott
Special assistant to the CTO at Trend Micro
Gregory Conti
Director of the Information and Technology and Operations research center and Assistant Professor of Computer Science at the United States Military Academy at West Point.
Rob P. Faber
infrastructure architect, consultant and senior engineer
Paul Sheldon Foote
Professor of Accounting at California State University, Fullerton.
Mark Harris
Global Director of SophosLabs.
Reena Hora
Student pursuing her Masters in Information Technology from California State University, Fullerton
Rick Lawhorn
Director of Information Security & Compliance at PlanIT Technology Group
A.J. Newtson
Instructor, teaching Theory and Practice of Military Information Technology Sys- tems, at the United States Military Academy at West Point
Ulf T. Mattsson
CTO of Protegrity
George Moore
Senior threat researcher at Trend Micro
Mike Murray
Director of Neohapsis product testing lab
Robert Ross
Information Technology Instructor at the United States Military Academy at West Point
Dan Sarel
Director at Sentrigo
Didier Stevens
IT Security Consultant
Inaki Urzay
Chief Technology Officer of Panda Security
David Walling
Chief Technology Officer for nuBridges
Ralph Ware
Course Director and Instructor, teaching Information Technology, at the United States Military Academy at West Point.
Ben Whaley
Applied Trust Engineering


PDF download
Read issue 15 now

Table of contents

  • Proactive analysis of malware genes holds the key to network security
  • Advanced social engineering and human exploitation
  • Free visualization tools for security analysis and network monitoring
  • Internet terrorist: does such a thing really exist?
  • Weaknesses and protection of your wireless network
  • Fraud mitigation and biometrics following Sarbanes-Oxley
  • Application security matters: deploying enterprise software securely
  • The insider threat: hype vs. reality
  • How B2B gateways affect corporate information security
  • Reputation attacks, a little known Internet threat
  • Data protection and identity management
  • The good, the bad and the ugly of protecting data in a retail environment
  • Malware experts speak: F-Secure, Sophos, Trend Micro

(IN)SECURE Magazine archive

ISSUE 66(June, 2020)

  • Let’s be realistic about our expectations of AI
  • Full-time bug hunting: Pros and cons of an emerging career
  • Crowdsourced pentesting is not without its issues
go to issue

ISSUE 65.5(March, 2020)

More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center in San Francisco to explore the Human Element in cybersecurity through hundreds of keynote presentations, track sessions, tutorials, seminars and special events.

go to issue

ISSUE 65(February, 2020)

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue