ISSUE 16 (April 2008)
Security certification
Issue 16 Contributors
Vijay Basani
CEO & Co-Founder of eIQnetworks.
Rob P. Faber
Information security consultant
Anthony Fama
Executive Vice President and CIO of Executive Technology Group
Simon Ford
International Director for NCP Engineering
Oliver Friedrichs
Director of Emerging Technologies in Symantec Security Response,
Kohei Matsushita
General Manager of the Online Business of PlatʼHome Co., Ltd.
Marco M. Morana
Leader of the OWASP
Mike Murray
Director of Neohapsis product testing lab
Chris Sanders
Senior Support Engineer for KeeFORCE
Michael Semaniuk
Compliance and Security Solutions Architect at Tizor Systems
Yaacov Sherban
CEO of Applicure Technologies
Ben Uphoff
Vice President of Research for Packet Analytics

Security certification

PDF download
Read issue 16 now

Table of contents

  • Security policy considerations for virtual worlds
  • US political elections and cybercrime
  • Using packet analysis for network troubleshooting
  • The effectiveness of industry certifications
  • Is your data safe? Secure your web apps
  • RSA Conference 2008 / Black Hat 2008 Europe
  • Windows log forensics: did you cover your tracks?
  • Traditional vs. non-tranditional database auditing
  • Payment card data: know your defense options
  • Security risks for mobile computing on public WLANs: hotspot registration
  • Network event analysis with Net/FSE
  • Producing secure software with security enhanced software development processes

(IN)SECURE Magazine archive

ISSUE 66(June, 2020)

  • Let’s be realistic about our expectations of AI
  • Full-time bug hunting: Pros and cons of an emerging career
  • Crowdsourced pentesting is not without its issues
go to issue

ISSUE 65.5(March, 2020)

More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center in San Francisco to explore the Human Element in cybersecurity through hundreds of keynote presentations, track sessions, tutorials, seminars and special events.

go to issue

ISSUE 65(February, 2020)

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue