ISSUE 15 (February 2008)
Issue 15 Contributors
Sam Abbott-McCune
<Instructor, teaching Information Technology, Network Systems Management and Theory and Practice of Military IT Systems, at the United States Military Academy at West Point
Anthony Arrott
Special assistant to the CTO at Trend Micro
Gregory Conti
Director of the Information and Technology and Operations research center and Assistant Professor of Computer Science at the United States Military Academy at West Point.
Rob P. Faber
infrastructure architect, consultant and senior engineer
Paul Sheldon Foote
Professor of Accounting at California State University, Fullerton.
Mark Harris
Global Director of SophosLabs.
Reena Hora
Student pursuing her Masters in Information Technology from California State University, Fullerton
Rick Lawhorn
Director of Information Security & Compliance at PlanIT Technology Group
A.J. Newtson
Instructor, teaching Theory and Practice of Military Information Technology Sys- tems, at the United States Military Academy at West Point
Ulf T. Mattsson
CTO of Protegrity
George Moore
Senior threat researcher at Trend Micro
Mike Murray
Director of Neohapsis product testing lab
Robert Ross
Information Technology Instructor at the United States Military Academy at West Point
Dan Sarel
Director at Sentrigo
Didier Stevens
IT Security Consultant
Inaki Urzay
Chief Technology Officer of Panda Security
David Walling
Chief Technology Officer for nuBridges
Ralph Ware
Course Director and Instructor, teaching Information Technology, at the United States Military Academy at West Point.
Ben Whaley
Applied Trust Engineering


PDF download
Read issue 15 now

Table of contents

  • Proactive analysis of malware genes holds the key to network security
  • Advanced social engineering and human exploitation
  • Free visualization tools for security analysis and network monitoring
  • Internet terrorist: does such a thing really exist?
  • Weaknesses and protection of your wireless network
  • Fraud mitigation and biometrics following Sarbanes-Oxley
  • Application security matters: deploying enterprise software securely
  • The insider threat: hype vs. reality
  • How B2B gateways affect corporate information security
  • Reputation attacks, a little known Internet threat
  • Data protection and identity management
  • The good, the bad and the ugly of protecting data in a retail environment
  • Malware experts speak: F-Secure, Sophos, Trend Micro

(IN)SECURE Magazine archive More →

ISSUE 72(July, 2022 )
  • 7 threat detection challenges CISOs face and what they can do about it
  • How to set up a powerful insider threat program
  • An offensive mindset is crucial for effective cyber defense
go to issue
ISSUE 71.5(June, 2022 )

Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and more.

go to issue
ISSUE 71(March, 2022 )
  • Why security strategies need a new perspective
  • The evolution of security analytics
  • Open-source code: How to stay secure while moving fast
go to issue