ISSUE 38 (June 2013)
IT security jobs
ISSUE 38
Issue 38 Contributors
Hyeyeon Ahn
Vice President and CTO at Fasoo.com
Aditya Balapure
Information security researcher
Srinivas Mantripragada
Vice President of Technology at Infoblox
Nathan McNeill
Co-founder and Chief Strategy Officer at Bomgar
Stephen Newman
Vice President of Products at Damballa
Kai Roer
Senior Partner at The Roer Group

IT security jobs

PDF download
Read issue 38 now
Share

Table of contents

  • Becoming a computer forensic examiner
  • UEFI secure boot: Next generation booting or a controversial debate
  • How to detect malicious network behavior
  • What startups can learn from enterprise level data security tactics
  • To hack back or not to hack back?
  • Report: Infosecurity 2013
  • DNS attacks on the rise: Rethink your security posture
  • IT security jobs: What’s in demand and how to meet it
  • Remote support and security: What you don’t know can hurt you
  • A closer look to HITBSecConf 2013 Amsterdam

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue