ISSUE 17 (July 2008)
Reverse engineering
Issue 17 Contributors
Paul Asadoorian
Senior Network Security Engineer for OSHEAN
Praveen Dalal
Managing Partner of Perry4Law
James Dorrian
Assistant Vice President of Security with Fidelity National Information Services
Todd Feinman
CEO of Identity Finder
Sandro Gauci
Founder of EnableSecurity
Nigel Johnson
Vice President of Product Management and Business Development for Zix Corporation
Sam Masiello
MX Logic Threat Operations Center.
Bogdan Materna
Founder of VoIPshield
Marco M. Morana
Leader of the OWASP
Ulf T. Mattsson
CTO of Protegrity
Patrick McGregor
CEO and a founder of BitArmor
Russ McRee
Security analyst & researcher
Nancee Melby
Senior Product Manager for Shavlik Technologies
Alisa Shevchenko
Malware consultant
Michael Thumann
CSO and head of the ERNW Research
Tony UcedaVelez
Danny Quist
CEO and co-founder of Offensive Computing

Reverse engineering

PDF download
Read issue 17 now

Table of contents

  • Open redirect vulnerabilities: definition and prevention
  • The future of security is information-centric
  • Securing the enterprise data flow against advanced attacks
  • Bypassing and enhancing live behavioral protection
  • Security flaws identification and technical risk analysis through threat modeling
  • Migration from e-mail to web borne threats
  • Security training and awareness: strengthening your weakest link
  • Assessing risk in VoIP/UC networks
  • Building a secure wireless network for under $300
  • Reverse engineering software armoring
  • Point security solutions are not a 4 letter word
  • Hacking Second Life

(IN)SECURE Magazine archive More →

ISSUE 72(July, 2022 )
  • 7 threat detection challenges CISOs face and what they can do about it
  • How to set up a powerful insider threat program
  • An offensive mindset is crucial for effective cyber defense
go to issue
ISSUE 71.5(June, 2022 )

Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and more.

go to issue
ISSUE 71(March, 2022 )
  • Why security strategies need a new perspective
  • The evolution of security analytics
  • Open-source code: How to stay secure while moving fast
go to issue