ISSUE 29 (March 2011)
Virtual machines
ISSUE 29
Issue 29 Contributors
Megan Bell
Director of Analysis at Kivu Consulting
Michael Ginsberg
CEO of Echoworx Corporation
Simon Heron
CTO of Redscan
Brian Honan
Owner of BH Consulting, Founder of Ireland’s national CERT
Graham Kemp
Head of SAS’ public sector practice in the UK
Kai Lintumaa
Senior Forensics Investigator at Kivu Consulting
Ulf T. Mattsson
CTO of Protegrity
Scott Shetler
Product Manager at Entrust
Roman Yudkin
CTO of Confident Technologies

Virtual machines

PDF download
Read issue 29 now
Share

Table of contents

  • Virtual machines: Added planning to the forensic acquisition process
  • Review: iStorage diskGenie
  • Managers are from Mars, information security professionals are from Venus
  • PacketWars: A cyber security sport for a cyber age
  • Q&A: Graham Cluley on Facebook security and privacy
  • Financial Trojans: Following the money
  • Mobile encryption: The new frontier
  • Report: RSA Conference 2011
  • Q&A: Stefan Frei on security research and vulnerability management
  • The expanding role of digital certificatesÉ in more places than you think

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue