ISSUE 22 (September 2009)
Digital certificates
ISSUE 22
Issue 22 Contributors
Kyle Adams
Lead Software Architect for Mykonos
Jamie Adams
Senior Secure Systems Engineer Trusted Computer Solutions
Taher Elgamal
Chief Security Officer at Axway
Ron Gula
CEO of Tenable Network Security
Michael Hall
CISO for High Security Programs and Director of PC Engineering at DriveSavers Data Recovery
Brent Huston
CEO and Security Evangelist at MicroSolved
Erhan J. Kartaltepe
Associate director of the Institute for Cyber Security at the University of Texas, San Antonio
Alexei Lesnykh
Business Development Director at DeviceLock
Richard Moulds
EVP of product strategy for the information systems security activities of Thales
John Moyer
President and CEO of BeyondTrust
Kyle Parris
Director of Product Management for nuBridges
Jim Peterson
Chief Scientist at PKWARE
Michael T. Raggo
Security technology expert
Yaron Sinai
Founder and CEO of Elementool
Rajender Singh
IT security consultant
Fred Touchette
Senior Security Analyst at AppRiver

Digital certificates

PDF download
Read issue 22 now
Share

Table of contents

  • Using real-time events to drive your network scans
  • The Nmap project: Open source with style
  • A look at geolocation, URL shortening and top Twitter threats
  • Review: Data Locker
  • Making clouds secure
  • Top 5 myths about wireless protection
  • Securing the foundation of IT systems
  • Is your data recovery provider a data security problem?
  • Security for multi-enterprise applications
  • In mashups we trust?

(IN)SECURE Magazine archive

ISSUE 69(July, 2021)

  • Why threat hunting is obsolete without context
  • Defending against Windows RDP attacks
  • Navigating the waters of maritime cybersecurity
go to issue

ISSUE 68(March, 2021)

  • Physical cyber threats: What do criminals leave when they break in?
  • Review: Group-IB Fraud Hunting Platform
  • Tips for boosting the “Sec” part of DevSecOps
go to issue

ISSUE 67(November, 2020)

  • Hardware security: Emerging attacks and protection mechanisms
  • Justifying your 2021 cybersecurity budget
  • Cooking up secure code: A foolproof recipe for open source
  • Mapping the motives of insider threats
go to issue