ISSUE 15 (February 2008)
Issue 15 Contributors
Sam Abbott-McCune
Anthony Arrott
Special assistant to the CTO at Trend Micro
Gregory Conti
Director of the Information and Technology and Operations research center and Assistant Professor of Computer Science at the United States Military Academy at West Point.
Rob P. Faber
infrastructure architect, consultant and senior engineer
Paul Sheldon Foote
Professor of Accounting at California State University, Fullerton.
Mark Harris
Global Director of SophosLabs.
Reena Hora
Student pursuing her Masters in Information Technology from California State University, Fullerton
Rick Lawhorn
Director of Information Security & Compliance at PlanIT Technology Group
A.J. Newtson
Instructor, teaching Theory and Practice of Military Information Technology Sys- tems, at the United States Military Academy at West Point
Ulf T. Mattsson
CTO of Protegrity
George Moore
Senior threat researcher at Trend Micro
Mike Murray
Director of Neohapsis product testing lab
Robert Ross
Information Technology Instructor at the United States Military Academy at West Point
Dan Sarel
Director at Sentrigo
Didier Stevens
IT Security Consultant
Inaki Urzay
Chief Technology Officer of Panda Security
David Walling
Chief Technology Officer for nuBridges
Ralph Ware
Course Director and Instructor, teaching Information Technology, at the United States Military Academy at West Point.
Ben Whaley
Applied Trust Engineering


PDF download
Read issue 15 now

Table of contents

  • Proactive analysis of malware genes holds the key to network security
  • Advanced social engineering and human exploitation
  • Free visualization tools for security analysis and network monitoring
  • Internet terrorist: does such a thing really exist?
  • Weaknesses and protection of your wireless network
  • Fraud mitigation and biometrics following Sarbanes-Oxley
  • Application security matters: deploying enterprise software securely
  • The insider threat: hype vs. reality
  • How B2B gateways affect corporate information security
  • Reputation attacks, a little known Internet threat
  • Data protection and identity management
  • The good, the bad and the ugly of protecting data in a retail environment
  • Malware experts speak: F-Secure, Sophos, Trend Micro

(IN)SECURE Magazine archive

ISSUE 69(July, 2021)

  • Why threat hunting is obsolete without context
  • Defending against Windows RDP attacks
  • Navigating the waters of maritime cybersecurity
go to issue

ISSUE 68(March, 2021)

  • Physical cyber threats: What do criminals leave when they break in?
  • Review: Group-IB Fraud Hunting Platform
  • Tips for boosting the “Sec” part of DevSecOps
go to issue

ISSUE 67(November, 2020)

  • Hardware security: Emerging attacks and protection mechanisms
  • Justifying your 2021 cybersecurity budget
  • Cooking up secure code: A foolproof recipe for open source
  • Mapping the motives of insider threats
go to issue