ISSUE 37 (March 2013)
Malware analysts
ISSUE 37
Issue 37 Contributors
Bogdan Botezatu
Senior E-Threat Analyst at Bitdefender
Amy Burrell
Training Manager at Perpetuity Training
Brian Honan
Owner of BH Consulting, Founder of Ireland’s national CERT
Dan Kuykendall
Co-CEO and CTO of NT OBJECTives
Michael S. Oberlaender
Security executive
Steve Pate
Co-founder and CTO at HighCloud Security

Malware analysts

PDF download
Read issue 37 now
Share

Table of contents

  • Becoming a malware analyst
  • Review: Nipper Studio
  • Five questions for Microsoft’s Chief Privacy Officer
  • Application security testing for AJAX and JSON
  • Penetrating and achieving persistence in highly secured networks
  • Report: RSA Conference 2013
  • Social engineering: An underestimated danger
  • Review: Hacking Web Apps
  • Improving information security with one simple question
  • Security needs to be handled at the top
  • 8 key data privacy considerations when moving servers to the public cloud

(IN)SECURE Magazine archive

ISSUE 69(July, 2021)

  • Why threat hunting is obsolete without context
  • Defending against Windows RDP attacks
  • Navigating the waters of maritime cybersecurity
go to issue

ISSUE 68(March, 2021)

  • Physical cyber threats: What do criminals leave when they break in?
  • Review: Group-IB Fraud Hunting Platform
  • Tips for boosting the “Sec” part of DevSecOps
go to issue

ISSUE 67(November, 2020)

  • Hardware security: Emerging attacks and protection mechanisms
  • Justifying your 2021 cybersecurity budget
  • Cooking up secure code: A foolproof recipe for open source
  • Mapping the motives of insider threats
go to issue