ISSUE 23 (November 2009)
Year in review
ISSUE 23
Issue 23 Contributors
Steve Dispensa
Co-founder and CTO of PhoneFactor
Matt Erasmus
Information security geek
Chris Hadnagy
Developer of the Social Engineering Framework
Marc Hocking
CTO of Becrypt
Nick Lowe
Regional Director for Northern Europe for Check Point
Hugh McCartney
CEO of Cloudmark
Josh Phillips
Senior Virus Researcher at Kaspersky Lab
Kathleen Porter
Partner in the Business Group and chair of the firm’s Intellectual Property and Technology Practice Group
George Sidman
Chairman and Chief Technology Architect at WebLOQ

Year in review

PDF download
Read issue 23 now
Share

Table of contents

  • Microsoft’s security patches year in review: A malware researcher’s perspective
  • A closer look at Red Condor Hosted Service
  • Report: RSA Conference Europe 2009, London
  • The U.S. Department of Homeland Security has a vision for stronger information security
  • Q&A: Didier Stevens on malicious PDFs
  • Protecting browsers, endpoints and enterprises against new Web-based attacks
  • Mobile spam: An old challenge in a new guise
  • Report: BruCON security conference, Brussels
  • Study uncovers alarming password usage behavior
  • Elevating email to an enterprise-class database application solution

(IN)SECURE Magazine archive

ISSUE 65.5(March, 2020)

More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center in San Francisco to explore the Human Element in cybersecurity through hundreds of keynote presentations, track sessions, tutorials, seminars and special events.

go to issue

ISSUE 65(February, 2020)

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue

    ISSUE 64(December, 2019)

    • Could audio warnings augment your ability to fight off cyberattacks?
    • Your supplier’s BEC problem is your BEC problem
    • Unmask cybercriminals through identity attribution
    • Want to build a SOC? Here is what you need to know beforehand
    go to issue