ISSUE 24 (February 2010)
Threats 2.0
ISSUE 24
Issue 24 Contributors
Juan Carlos Calderon
Information Security Research Leader for Softtek
Santhosh Cheeniyil
Founder and VP of Engineering of Avenda Systems
Joseph Dell
President of Lightwave Security
Anthony Fama
Partner at Computer Integrated Services
Max Huang
Founder and President of O2Security
Caroline Ikomi
Technical Director at Check Point
Vladimir Jirasek
Security Architect at Nokia UK
Wim Remes
Information security consultant
Sascha Seidel
Freelance developer
Didier Stevens
IT Security Consultant at Contraste Europe NV

Threats 2.0

PDF download
Read issue 24 now
Share

Table of contents

  • Writing a secure SOAP client with PHP: Field report from a real-world project
  • How virtualized browsing shields against web-based attacks
  • Review: 1Password 3
  • Preparing a strategy for application vulnerability detection
  • Threats 2.0: A glimpse into the near future
  • Preventing malicious documents from compromising Windows machines
  • Balancing productivity and security in a mixed environment
  • AES and 3DES comparison analysis
  • OSSEC: An introduction to open source log and event management
  • Secure and differentiated access in enterprise wireless networks

(IN)SECURE Magazine archive

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue

ISSUE 61.5(March, 2019)

RSA Conference, the world’s leading information security conferences and expositions, concluded its 28th annual event in San Francisco.

go to issue