ISSUE 42 (June 2014)
Who are you?
Issue 42 Contributors
Chuck Archer
CEO and Executive Chairman of Covata USA
Christiaan Brand
co-founder and CTO of Entersekt
Tom Cross
Director of Security Research at Lancope
Chris Hoff
VP, Strategic Planning – Security Business Unit at Juniper Networks
Mike Horn
Vice President of Threat and Response Products at Proofpoint
Corey Nachreiner
Director of Security Strategy and Research at WatchGuard Technologies
Kai Roer
Senior Partner at The Roer Group
Jason Sabin
VP of Research & Development at DigiCert
Ramil Yafizov
Systems Engineer at Nominum

Who are you?

PDF download
Read issue 42 now

Table of contents

  • Six infosec tips I learned from Game of Thrones
  • Dissecting the newly-discovered desire for control and privacy
  • Incident response and failure of the “Just Fix It” attitude
  • How to learn information security
  • Who are you? The impact of security breaches on authentication
  • Thecus N5550 NAS Server inside and out
  • Report: Hack In The Box Amsterdam 2014
  • Ensuring the integrity of Rostelecom’s Wi-Fi network
  • What inspired you to start hacking?
  • Beyond Heartbleed: Closing SSL implementation gaps within our own networks
  • Ironclad incident response
  • Hands-on fun at HacKid 2014
  • Are you ready for the day that prevention fails?
  • Why privacy engineering is needed

(IN)SECURE Magazine archive

ISSUE 70(November, 2021)

  • How to develop a skilled cybersecurity team
  • Securing your WordPress website against ransomware attacks
  • How to prevent corporate credentials ending up on the dark web
go to issue

ISSUE 69(July, 2021)

  • Why threat hunting is obsolete without context
  • Defending against Windows RDP attacks
  • Navigating the waters of maritime cybersecurity
go to issue

ISSUE 68(March, 2021)

  • Physical cyber threats: What do criminals leave when they break in?
  • Review: Group-IB Fraud Hunting Platform
  • Tips for boosting the “Sec” part of DevSecOps
go to issue