ISSUE 37 (March 2013)
Malware analysts
ISSUE 37
Issue 37 Contributors
Bogdan Botezatu
Senior E-Threat Analyst at Bitdefender
Amy Burrell
Training Manager at Perpetuity Training
Brian Honan
Owner of BH Consulting, Founder of Ireland’s national CERT
Dan Kuykendall
Co-CEO and CTO of NT OBJECTives
Michael S. Oberlaender
Security executive
Steve Pate
Co-founder and CTO at HighCloud Security

Malware analysts

PDF download
Read issue 37 now
Share

Table of contents

  • Becoming a malware analyst
  • Review: Nipper Studio
  • Five questions for Microsoft’s Chief Privacy Officer
  • Application security testing for AJAX and JSON
  • Penetrating and achieving persistence in highly secured networks
  • Report: RSA Conference 2013
  • Social engineering: An underestimated danger
  • Review: Hacking Web Apps
  • Improving information security with one simple question
  • Security needs to be handled at the top
  • 8 key data privacy considerations when moving servers to the public cloud

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue