ISSUE 26 (November 2010)
Issue 26 Contributors
Blaine Anderson
Information security student
Mike Byrnes
Product Manager at Entrust
Ennio Carboni
President of Ipswitch Network Management Division
Max Huang
Founder and CEO of O2Security
Rafal Los
Application Security Evangelist with HP Software
Dmitry Oleksyuk
System Architect with eSage Lab
Amichai Shulman
Co-founder and CTO of Imperva
Abir Thakurta
Senior Director of Professional Services for nuBridges


PDF download
Read issue 26 now

Table of contents

  • Database protocol exploits explained
  • Review: MXI M700 Bio
  • Measuring web application security coverage
  • Inside backup and storage: The expert’s view
  • Combating the changing nature of online fraud
  • Successful data security programs encompass processes, people, technology
  • Sangria, tapas and hackers: SOURCE Barcelona 2010
  • What CSOs can learn from college basketball
  • Network troubleshooting 101
  • America’s cyber cold war
  • RSA Conference Europe 2010
  • Bootkits – a new stage of development

(IN)SECURE Magazine archive

ISSUE 66(June, 2020)

  • Let’s be realistic about our expectations of AI
  • Full-time bug hunting: Pros and cons of an emerging career
  • Crowdsourced pentesting is not without its issues
go to issue

ISSUE 65.5(March, 2020)

More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center in San Francisco to explore the Human Element in cybersecurity through hundreds of keynote presentations, track sessions, tutorials, seminars and special events.

go to issue

ISSUE 65(February, 2020)

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue