ISSUE 21 (June, 2009)

Windows 7 security

Issue 21 Contributors

Ed Adams
President and CEO of Security Innovation
Jack Danahy
Founder and CTO of Ounce Labs
Srini Devadas
Founder and CTO of Verayo
Tom Eston
Penetration tester
Rob Faber
Information security consultant for Atos Origin
Mervyn Heng
Security lead for a hardware manufacturer
Vlatko Kosturjak
Security specialist
Sam Masiello
VP of Information Security at MX Logic
Ulf T. Mattsson
CTO of Protegrity
Ned Moran
Adjunct Professor of Information Privacy and Security at Georgetown University
Daniel Oppermann
Political scientist
Gideon T. Rasmussen
Security Vice President
David Rook
Security Analyst for Realex Payments
Chris Sanders
Network consultant
Didier Stevens
IT Security Consultant at Contraste Europe NV

Table of contents

  • Malicious PDF: Get owned without opening
  • Review: IronKey Personal
  • Windows 7 security features: Building on Vista
  • Using Wireshark to capture and analyze wireless traffic
  • “Unclonable” RFID – a technical overview
  • Secure development principles
  • Q&A: Ron Gula on Nessus and Tenable Network Security
  • Establish your social media presence with security in mind
  • A historical perspective on the cybersecurity dilemma
  • A risk-based, cost effective approach to holistic security

(IN)SECURE Magazine archive

show all