ISSUE 19 (December 2008)
The future of AV
Issue 19 Contributors
Francois Amigorena
Founder and CEO of IS Decisions
Melih Abdulhayoglu
Comodo creator
Pekka Andelin
Malware Researcher at Lavasoft
Debbie Christofferson
Information security manager
Sandro Gauci
Founder of EnableSecurity
Carey Nachenberg
Symantec Fellow in the Security Technology and Response Group
Ulf T. Mattsson
CTO of Protegrity
Chris Overton
VP Product Development at CyberPatrol
Michael Scheidell
President and CTO of SECNAP Network Security Corporation
Carlos Serrao
OWASP Portuguese Chapter Leader
Dr. Steve Slater,
Founder and CEO of Security Compliance Corporation

The future of AV

PDF download
Read issue 19 now

Table of contents

  • The future of AV: looking for the good while stopping the bad
  • Eight holes in Windows login controls
  • Extended validation and online security: EV SSL gets the green light
  • Interview with Giles Hogben, an expert on identity and authentication technologies working at ENISA
  • Web filtering in a Web 2.0 world
  • RSA Conference Europe 2008
  • The role of password management in compliance with the data protection act
  • Securing data beyond PCI in a SOA environment: best practices for advanced data protection
  • Three undocumented layers of the OSI model and their impact on security
  • Interview with Rich Mogull, founder of Securosis

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue