ISSUE 35 (December 2012)
Scripting with Nmap
Issue 35 Contributors
Paul Anderson
West Point graduate
Steven Billington
Senior at West Point
Gregory Conti
Director of West Point’s Cyber Research Center
Alex Farmer
West Point graduate
Carlos Garcia Prado
IT security consultant
Péter Gyöngyösi
Product Manager at BalaBit IT Security
Cory Kirk
Senior at West Point
Jacob Kitchel
Senior Manager of Security and Compliance at Industrial Defender
Patrick Shaffer
West Point graduate
Edward Sobiesk
Director of West Point’s Information Technology Program
Kyle Stammer
West Point graduate
Didier Stevens
IT Security Consultant at Contraste Europe NV
Darren Suprina
IT Systems Designer at Stonesoft
Gavin Watson
Senior Security Engineer and Head of the Social Engineering Team at RandomStorm

Scripting with Nmap

PDF download
Read issue 35 now

Table of contents

  • Administrative scripting with Nmap
  • Information security in Europe with ENISA Executive Director Prof. Udo Helmbrecht
  • Unintended, malicious and evil applications of augmented reality
  • The enemy at the gate
  • Top five hurdles to security and compliance in industrial control systems
  • How to monitor the blind spots in your IT system: Logging versus auditing
  • DBI aid reverse engineering: Pinpointing interesting code
  • The importance of data normalization in IPS

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue