ISSUE 16 (April 2008)
Security certification
Issue 16 Contributors
Vijay Basani
CEO & Co-Founder of eIQnetworks.
Rob P. Faber
Information security consultant
Anthony Fama
Executive Vice President and CIO of Executive Technology Group
Simon Ford
International Director for NCP Engineering
Oliver Friedrichs
Director of Emerging Technologies in Symantec Security Response,
Kohei Matsushita
General Manager of the Online Business of PlatʼHome Co., Ltd.
Marco M. Morana
Leader of the OWASP
Mike Murray
Director of Neohapsis product testing lab
Chris Sanders
Senior Support Engineer for KeeFORCE
Michael Semaniuk
Compliance and Security Solutions Architect at Tizor Systems
Yaacov Sherban
CEO of Applicure Technologies
Ben Uphoff
Vice President of Research for Packet Analytics

Security certification

PDF download
Read issue 16 now

Table of contents

  • Security policy considerations for virtual worlds
  • US political elections and cybercrime
  • Using packet analysis for network troubleshooting
  • The effectiveness of industry certifications
  • Is your data safe? Secure your web apps
  • RSA Conference 2008 / Black Hat 2008 Europe
  • Windows log forensics: did you cover your tracks?
  • Traditional vs. non-tranditional database auditing
  • Payment card data: know your defense options
  • Security risks for mobile computing on public WLANs: hotspot registration
  • Network event analysis with Net/FSE
  • Producing secure software with security enhanced software development processes

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue