ISSUE 39 (September 2013)
Web app security
Issue 39 Contributors
Roy Adar
VP of Product Management at Cyber-Ark
Alexander Bolshev
Senior Penetration Tester at ERPScan
Dmitry Chastukhin
Director of Pentesting at ERPScan
Joshua Dionne
IT security enthusiast
Troy Gill
Senior Security Analyst at AppRiver
Brian Honan
Owner of BH Consulting, Founder of Ireland’s national CERT
Michael S. Oberlaender
Security executive
Josh Pauli
Associate Professor of Information Security at Dakota State University
Kai Roer
Senior Partner at The Roer Group
Didier Stevens
IT Security Consultant, Founder of Didier Stevens Labs

Web app security

PDF download
Read issue 39 now

Table of contents

  • Dear CSO, do you know how to build security culture?
  • How to secure a company’s Chinese development center?
  • Stephen Pao, GM, Security Business at Barracuda Networks, on web application security
  • The state of web application security in numbers
  • Web application exploitation with broken authentication and path traversal
  • Joel Smith, AppRiver CTO, on web threats
  • With big data comes big responsibility: The (in)security of OLAP systems
  • There are no winners in the blame game
  • Digital graphology: It’s all in the signature
  • Security from within: Proactive steps towards protecting corporate assets from attack
  • The five biggest reasons your IT staff is losing sleep
  • How to manage your passwords with KeePass

(IN)SECURE Magazine archive

ISSUE 66(June, 2020)

  • Let’s be realistic about our expectations of AI
  • Full-time bug hunting: Pros and cons of an emerging career
  • Crowdsourced pentesting is not without its issues
go to issue

ISSUE 65.5(March, 2020)

More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center in San Francisco to explore the Human Element in cybersecurity through hundreds of keynote presentations, track sessions, tutorials, seminars and special events.

go to issue

ISSUE 65(February, 2020)

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue