ISSUE 20 (March 2009)
Mac OS X (in)security
Issue 20 Contributors
Pekka Andelin
Malware Researcher at Lavasoft
Ofir Arkin
Co-founder and CTO of Insightix and Sys-Security Group
Paul Clements
Lead software architect at SteelEye Technology, Inc.
Yarochkin Fyodor
Graduate student at the National Taiwan University
Rick Leclerc
VP Technology Partnerships at Bradford Networks
Alexei Lesnykh
Business Development Manager at DeviceLock
Gary Palgon
Vice President of Product Management for nuBridges
Vimal Patel
Founder of Blueinfy
Kevin Riggins
Senior Information Security Analyst for Principal Financial Group
Darran Rolls
CTO of SailPoint Technologie
Aaron D. Sanders
Organization Information Security Manager for Xerox Global Services
Shreeraj Shah
Founder and director of Blueinf,
Didier Stevens
IT Security Consultant

Mac OS X (in)security

PDF download
Read issue 20 now

Table of contents

  • Improving network discovery mechanisms
  • Building a bootable BackTrack 4 thumb drive with persistent changes and Nessus
  • What you need to know about tokenization
  • Q&A: Vincenzo Iozzo on Mac OS X security
  • A framework for quantitative privacy measurement
  • Why fail? Secure your virtual assets
  • Phased deployment of Network Access Control
  • Web 2.0 case studies: challenges, approaches and vulnerabilities
  • ISP level malware filtering
  • Q&A: Scott Henderson on the Chinese underground

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue