ISSUE 29 (March 2011)
Virtual machines
ISSUE 29
Issue 29 Contributors
Megan Bell
Director of Analysis at Kivu Consulting
Michael Ginsberg
CEO of Echoworx Corporation
Simon Heron
CTO of Redscan
Brian Honan
Owner of BH Consulting, Founder of Ireland’s national CERT
Graham Kemp
Head of SAS’ public sector practice in the UK
Kai Lintumaa
Senior Forensics Investigator at Kivu Consulting
Ulf T. Mattsson
CTO of Protegrity
Scott Shetler
Product Manager at Entrust
Roman Yudkin
CTO of Confident Technologies

Virtual machines

PDF download
Read issue 29 now
Share

Table of contents

  • Virtual machines: Added planning to the forensic acquisition process
  • Review: iStorage diskGenie
  • Managers are from Mars, information security professionals are from Venus
  • PacketWars: A cyber security sport for a cyber age
  • Q&A: Graham Cluley on Facebook security and privacy
  • Financial Trojans: Following the money
  • Mobile encryption: The new frontier
  • Report: RSA Conference 2011
  • Q&A: Stefan Frei on security research and vulnerability management
  • The expanding role of digital certificatesÉ in more places than you think

(IN)SECURE Magazine archive

ISSUE 69(July, 2021)

  • Why threat hunting is obsolete without context
  • Defending against Windows RDP attacks
  • Navigating the waters of maritime cybersecurity
go to issue

ISSUE 68(March, 2021)

  • Physical cyber threats: What do criminals leave when they break in?
  • Review: Group-IB Fraud Hunting Platform
  • Tips for boosting the “Sec” part of DevSecOps
go to issue

ISSUE 67(November, 2020)

  • Hardware security: Emerging attacks and protection mechanisms
  • Justifying your 2021 cybersecurity budget
  • Cooking up secure code: A foolproof recipe for open source
  • Mapping the motives of insider threats
go to issue