ISSUE 18 (October 2008)
Proactive defense
ISSUE 18
Issue 18 Contributors
Michael Boelen
UNIX engineer
Sacha Chahrvin
Managing Director at DeviceLock UK
Jack Danahy
Founder and CTO of Ounce Labs
Rob P. Faber
Stephane Fymat
VP of Business Development and Strategy at Passlogix
Information security consultant
Sandro Gauci
Founder of EnableSecurity
Jeremiah Grossman,

Erik Hjelmvik
Independent network security researcher
Ulf T. Mattsson
CTO of Protegrity
Scott Mitic
CEO of TrustedID
Danny Quist
CEO and co-founder of Offensive Computing
Shrikant Raman
Security researcher
David Rook
Security Analyst for Realex Payments
Anibal Sacco
Exploit Writer at Core Security Technologies

Proactive defense

PDF download
Read issue 18 now
Share

Table of contents

  • Network and information security in Europe today
  • Browser security: bolt it on, then build it in
  • Passive network security analysis with NetworkMiner
  • Lynis – an introduction to UNIX system auditing
  • Windows driver vulnerabilities: the METHOD_NEITHER odyssey
  • Removing software armoring from executables
  • Insecurities in privacy protection software
  • Compliance does not equal security but it’s a good start
  • Secure web application development
  • The insider threat
  • Web application security: risky business?

(IN)SECURE Magazine archive

ISSUE 66(June, 2020)

  • Let’s be realistic about our expectations of AI
  • Full-time bug hunting: Pros and cons of an emerging career
  • Crowdsourced pentesting is not without its issues
go to issue

ISSUE 65.5(March, 2020)

More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center in San Francisco to explore the Human Element in cybersecurity through hundreds of keynote presentations, track sessions, tutorials, seminars and special events.

go to issue

ISSUE 65(February, 2020)

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue