ISSUE 21 (June 2009)
Windows 7 security
Issue 21 Contributors
Ed Adams
President and CEO of Security Innovation
Jack Danahy
Founder and CTO of Ounce Labs
Srini Devadas
Founder and CTO of Verayo
Tom Eston
Penetration tester
Rob Faber
Information security consultant for Atos Origin
Mervyn Heng
Security lead for a hardware manufacturer
Vlatko Kosturjak
Security specialist
Sam Masiello
VP of Information Security at MX Logic
Ulf T. Mattsson
CTO of Protegrity
Ned Moran
Adjunct Professor of Information Privacy and Security at Georgetown University
Daniel Oppermann
Political scientist
Gideon T. Rasmussen
Security Vice President
David Rook
Security Analyst for Realex Payments
Chris Sanders
Network consultant
Didier Stevens
IT Security Consultant at Contraste Europe NV

Windows 7 security

PDF download
Read issue 21 now

Table of contents

  • Malicious PDF: Get owned without opening
  • Review: IronKey Personal
  • Windows 7 security features: Building on Vista
  • Using Wireshark to capture and analyze wireless traffic
  • “Unclonable” RFID – a technical overview
  • Secure development principles
  • Q&A: Ron Gula on Nessus and Tenable Network Security
  • Establish your social media presence with security in mind
  • A historical perspective on the cybersecurity dilemma
  • A risk-based, cost effective approach to holistic security

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue