ISSUE 21 (June 2009)
Windows 7 security
ISSUE 21
Issue 21 Contributors
Ed Adams
President and CEO of Security Innovation
Jack Danahy
Founder and CTO of Ounce Labs
Srini Devadas
Founder and CTO of Verayo
Tom Eston
Penetration tester
Rob Faber
Information security consultant for Atos Origin
Mervyn Heng
Security lead for a hardware manufacturer
Vlatko Kosturjak
Security specialist
Sam Masiello
VP of Information Security at MX Logic
Ulf T. Mattsson
CTO of Protegrity
Ned Moran
Adjunct Professor of Information Privacy and Security at Georgetown University
Daniel Oppermann
Political scientist
Gideon T. Rasmussen
Security Vice President
David Rook
Security Analyst for Realex Payments
Chris Sanders
Network consultant
Didier Stevens
IT Security Consultant at Contraste Europe NV

Windows 7 security

PDF download
Read issue 21 now
Share

Table of contents

  • Malicious PDF: Get owned without opening
  • Review: IronKey Personal
  • Windows 7 security features: Building on Vista
  • Using Wireshark to capture and analyze wireless traffic
  • “Unclonable” RFID – a technical overview
  • Secure development principles
  • Q&A: Ron Gula on Nessus and Tenable Network Security
  • Establish your social media presence with security in mind
  • A historical perspective on the cybersecurity dilemma
  • A risk-based, cost effective approach to holistic security

(IN)SECURE Magazine archive

ISSUE 69(July, 2021)

  • Why threat hunting is obsolete without context
  • Defending against Windows RDP attacks
  • Navigating the waters of maritime cybersecurity
go to issue

ISSUE 68(March, 2021)

  • Physical cyber threats: What do criminals leave when they break in?
  • Review: Group-IB Fraud Hunting Platform
  • Tips for boosting the “Sec” part of DevSecOps
go to issue

ISSUE 67(November, 2020)

  • Hardware security: Emerging attacks and protection mechanisms
  • Justifying your 2021 cybersecurity budget
  • Cooking up secure code: A foolproof recipe for open source
  • Mapping the motives of insider threats
go to issue