ISSUE 42

ISSUE 42 (June, 2014)

Who are you?

Issue 42 Contributors

Chuck Archer
CEO and Executive Chairman of Covata USA
Christiaan Brand
co-founder and CTO of Entersekt
Tom Cross
Director of Security Research at Lancope
Chris Hoff
VP, Strategic Planning – Security Business Unit at Juniper Networks
Mike Horn
Vice President of Threat and Response Products at Proofpoint
Corey Nachreiner
Director of Security Strategy and Research at WatchGuard Technologies
Kai Roer
Senior Partner at The Roer Group
Jason Sabin
VP of Research & Development at DigiCert
Ramil Yafizov
Systems Engineer at Nominum

Table of contents

  • Six infosec tips I learned from Game of Thrones
  • Dissecting the newly-discovered desire for control and privacy
  • Incident response and failure of the “Just Fix It” attitude
  • How to learn information security
  • Who are you? The impact of security breaches on authentication
  • Thecus N5550 NAS Server inside and out
  • Report: Hack In The Box Amsterdam 2014
  • Ensuring the integrity of Rostelecom’s Wi-Fi network
  • What inspired you to start hacking?
  • Beyond Heartbleed: Closing SSL implementation gaps within our own networks
  • Ironclad incident response
  • Hands-on fun at HacKid 2014
  • Are you ready for the day that prevention fails?
  • Why privacy engineering is needed

(IN)SECURE Magazine archive

show all