ISSUE 26 (November 2010)
Bootkits
ISSUE 26
Issue 26 Contributors
Blaine Anderson
Information security student
Mike Byrnes
Product Manager at Entrust
Ennio Carboni
President of Ipswitch Network Management Division
Max Huang
Founder and CEO of O2Security
Rafal Los
Application Security Evangelist with HP Software
Dmitry Oleksyuk
System Architect with eSage Lab
Amichai Shulman
Co-founder and CTO of Imperva
Abir Thakurta
Senior Director of Professional Services for nuBridges

Bootkits

PDF download
Read issue 26 now
Share

Table of contents

  • Database protocol exploits explained
  • Review: MXI M700 Bio
  • Measuring web application security coverage
  • Inside backup and storage: The expert’s view
  • Combating the changing nature of online fraud
  • Successful data security programs encompass processes, people, technology
  • Sangria, tapas and hackers: SOURCE Barcelona 2010
  • What CSOs can learn from college basketball
  • Network troubleshooting 101
  • America’s cyber cold war
  • RSA Conference Europe 2010
  • Bootkits – a new stage of development

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue