ISSUE 23 (November 2009)
Year in review
Issue 23 Contributors
Steve Dispensa
Co-founder and CTO of PhoneFactor
Matt Erasmus
Information security geek
Chris Hadnagy
Developer of the Social Engineering Framework
Marc Hocking
CTO of Becrypt
Nick Lowe
Regional Director for Northern Europe for Check Point
Hugh McCartney
CEO of Cloudmark
Josh Phillips
Senior Virus Researcher at Kaspersky Lab
Kathleen Porter
Partner in the Business Group and chair of the firm’s Intellectual Property and Technology Practice Group
George Sidman
Chairman and Chief Technology Architect at WebLOQ

Year in review

PDF download
Read issue 23 now

Table of contents

  • Microsoft’s security patches year in review: A malware researcher’s perspective
  • A closer look at Red Condor Hosted Service
  • Report: RSA Conference Europe 2009, London
  • The U.S. Department of Homeland Security has a vision for stronger information security
  • Q&A: Didier Stevens on malicious PDFs
  • Protecting browsers, endpoints and enterprises against new Web-based attacks
  • Mobile spam: An old challenge in a new guise
  • Report: BruCON security conference, Brussels
  • Study uncovers alarming password usage behavior
  • Elevating email to an enterprise-class database application solution

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue