ISSUE 26 (June 2010)
PCI Security
ISSUE 26
Issue 26 Contributors
Mayank Aggarwal
Security researcher at Global Threat Center, SMobile Systems
Rishita Anubhai
Web Security Researcher at Blueinfy
Shivang Bhagat
Security Consultant at Blueinfy
Anton Chuvakin
Log management and PCI DSS compliance expert
David Crowder
CEO of Pramana
Matt Erasmus
Info-sec professional
Matt Grantham
Network security engineer
Max Huang
Founder and CEO of O2Security
Rick Kam
President and Founder of ID Experts
Nick Lowe
Head of Western Europe sales for Check Point
Jerry Mangiarelli
IT Security Specialist with TD Bank Financial Group
Ulf T. Mattsson
CTO of Protegrity
Dimitri McKay
Security Architect at LogLogic
Dave Olander
SVP Engineering at Xceedium
Didier Stevens
IT Security Consultant at Contraste Europe NV

PCI Security

PDF download
Read issue 26 now
Share

Table of contents

  • PCI: Security’s lowest common denominator
  • Analyzing Flash-based RIA components and discovering vulnerabilities
  • Logs: Can we finally tame the beast?
  • Launch arbitrary code from Excel in a restricted environment
  • Placing the burden on the bot
  • Data breach risks and privacy compliance
  • Authenticating Linux users against Microsoft Active Directory
  • Hacking under the radar
  • iPhone backup, encryption and forensics

(IN)SECURE Magazine archive

ISSUE 65.5(March, 2020)

More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center in San Francisco to explore the Human Element in cybersecurity through hundreds of keynote presentations, track sessions, tutorials, seminars and special events.

go to issue

ISSUE 65(February, 2020)

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue

    ISSUE 64(December, 2019)

    • Could audio warnings augment your ability to fight off cyberattacks?
    • Your supplier’s BEC problem is your BEC problem
    • Unmask cybercriminals through identity attribution
    • Want to build a SOC? Here is what you need to know beforehand
    go to issue