ISSUE 27 (September 2010)
Cybercrime
ISSUE 27
Issue 27 Contributors
Pat Carroll
CEO of ValidSoft
Steve Dispensa
Co-founder and CTO of PhoneFactor
Todd Ignasiak
Director of Product Management at Altor Networks
Michael Leland
CTO at NitroSecurity
Rob McConnell
Market Director within SQS Group
Gideon Rasmussen
Information security manager
Erich Samuel
Information security consultant
Winn Schwartau
Chairman of the Board of Directors, Mobile Application Development Partners
Dan Sherman
Information Assurance Research Lead with Telos Corporation

Cybercrime

PDF download
Read issue 27 now
Share

Table of contents

  • Review: BlockMaster SafeStick secure USB flash drive
  • The devil is in the details: Securing the enterprise against the cloud
  • Cybercrime may be on the rise, but authentication evolves to defeat it
  • Learning from bruteforcers
  • PCI DSS v1.3: Vital to the emerging demand for virtualization and cloud security
  • Security testing – the key to software quality
  • Payment card security: Risk and control assessments
  • Security as a process: Does your security team fuzz?
  • Intelligent security: Countering sophisticated fraud

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue