ISSUE 39 (September 2013)
Web app security
ISSUE 39
Issue 39 Contributors
Roy Adar
VP of Product Management at Cyber-Ark
Alexander Bolshev
Senior Penetration Tester at ERPScan
Dmitry Chastukhin
Director of Pentesting at ERPScan
Joshua Dionne
IT security enthusiast
Troy Gill
Senior Security Analyst at AppRiver
Brian Honan
Owner of BH Consulting, Founder of Ireland’s national CERT
Michael S. Oberlaender
Security executive
Josh Pauli
Associate Professor of Information Security at Dakota State University
Kai Roer
Senior Partner at The Roer Group
Didier Stevens
IT Security Consultant, Founder of Didier Stevens Labs

Web app security

PDF download
Read issue 39 now
Share

Table of contents

  • Dear CSO, do you know how to build security culture?
  • How to secure a company’s Chinese development center?
  • Stephen Pao, GM, Security Business at Barracuda Networks, on web application security
  • The state of web application security in numbers
  • Web application exploitation with broken authentication and path traversal
  • Joel Smith, AppRiver CTO, on web threats
  • With big data comes big responsibility: The (in)security of OLAP systems
  • There are no winners in the blame game
  • Digital graphology: It’s all in the signature
  • Security from within: Proactive steps towards protecting corporate assets from attack
  • The five biggest reasons your IT staff is losing sleep
  • How to manage your passwords with KeePass

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue