ISSUE 22 (September 2009)
Digital certificates
Issue 22 Contributors
Kyle Adams
Lead Software Architect for Mykonos
Jamie Adams
Senior Secure Systems Engineer Trusted Computer Solutions
Taher Elgamal
Chief Security Officer at Axway
Ron Gula
CEO of Tenable Network Security
Michael Hall
CISO for High Security Programs and Director of PC Engineering at DriveSavers Data Recovery
Brent Huston
CEO and Security Evangelist at MicroSolved
Erhan J. Kartaltepe
Associate director of the Institute for Cyber Security at the University of Texas, San Antonio
Alexei Lesnykh
Business Development Director at DeviceLock
Richard Moulds
EVP of product strategy for the information systems security activities of Thales
John Moyer
President and CEO of BeyondTrust
Kyle Parris
Director of Product Management for nuBridges
Jim Peterson
Chief Scientist at PKWARE
Michael T. Raggo
Security technology expert
Yaron Sinai
Founder and CEO of Elementool
Rajender Singh
IT security consultant
Fred Touchette
Senior Security Analyst at AppRiver

Digital certificates

PDF download
Read issue 22 now

Table of contents

  • Using real-time events to drive your network scans
  • The Nmap project: Open source with style
  • A look at geolocation, URL shortening and top Twitter threats
  • Review: Data Locker
  • Making clouds secure
  • Top 5 myths about wireless protection
  • Securing the foundation of IT systems
  • Is your data recovery provider a data security problem?
  • Security for multi-enterprise applications
  • In mashups we trust?

(IN)SECURE Magazine archive More →

ISSUE 72(July, 2022 )
  • 7 threat detection challenges CISOs face and what they can do about it
  • How to set up a powerful insider threat program
  • An offensive mindset is crucial for effective cyber defense
go to issue
ISSUE 71.5(June, 2022 )

Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and more.

go to issue
ISSUE 71(March, 2022 )
  • Why security strategies need a new perspective
  • The evolution of security analytics
  • Open-source code: How to stay secure while moving fast
go to issue