ISSUE 31 (September 2011)
Hacking
ISSUE 31
Issue 31 Contributors
Chris Burchett
Co-founder, Head of Development and Product Management of Credant
Jon Callas
CTO at Entrust
Ari Elias-Bachrach
Information security engineer
Michael S. Oberlaender
Chief Security Officer for a European cable network provider
Dean P. Ocampo
Director of Cloud and Compliance Solutions, SafeNet
Harold Moss
CTO Cloud Computing Strategy, IBM
Darran Rolls
CTO of SailPoint

Hacking

PDF download
Read issue 31 now
Share

Table of contents

  • The changing face of hacking
  • Review: [hiddn] Crypto Adapter
  • A tech theory coming of age
  • SecurityByte 2011: Cyber conflicts, cloud computing and printer hacking
  • The need for foundational controls in cloud computing
  • A new approach to data centric security
  • The future of identity verification through keystroke dynamics
  • Visiting Bitdefender’s headquarters
  • Rebuilding walls in the clouds
  • Testing Domino applications
  • Report: Black Hat 2011 USA
  • Safeguarding user access in the cloud with identity governance

(IN)SECURE Magazine archive

ISSUE 67(November, 2020)

  • Hardware security: Emerging attacks and protection mechanisms
  • Justifying your 2021 cybersecurity budget
  • Cooking up secure code: A foolproof recipe for open source
  • Mapping the motives of insider threats
go to issue

ISSUE 66(June, 2020)

  • Let’s be realistic about our expectations of AI
  • Full-time bug hunting: Pros and cons of an emerging career
  • Crowdsourced pentesting is not without its issues
go to issue

ISSUE 65.5(March, 2020)

More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center in San Francisco to explore the Human Element in cybersecurity through hundreds of keynote presentations, track sessions, tutorials, seminars and special events.

go to issue