ISSUE 4 (October 2005)
Biometric security
ISSUE 4
Issue 4 Contributors
Richard Bejtlich
Founder of TaoSecurity
Jerry Malcolm
Owner/principle of Malcolm Systems Services
Ulf T. Mattsson
CTO of Protegrity
Dr. Cyrus Peikari
Founder of Airscanner Corporation
Nicholas Smith
Senior college student at Georgia Southern University
Matt Willmore
Graduate student at Purdue University.

Biometric security

PDF download
Read issue 4 now
Share

Table of contents

  • Structured traffic analysis
  • Access Control Lists in Tiger and Tiger Server – true permission management
  • Automating I.T. security audits
  • Biometric security
  • PDA attacks, part 2: airborne viruses – evolution of the latest threats
  • Build a custom firewall computer
  • Lock down your kernel with grsecurity
  • Interview with Sergey Ryzhikov, director of Bitrix
  • Best practices for database encryption solutions

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue