ISSUE 42 (June 2014)
Who are you?
ISSUE 42
Issue 42 Contributors
Chuck Archer
CEO and Executive Chairman of Covata USA
Christiaan Brand
co-founder and CTO of Entersekt
Tom Cross
Director of Security Research at Lancope
Chris Hoff
VP, Strategic Planning – Security Business Unit at Juniper Networks
Mike Horn
Vice President of Threat and Response Products at Proofpoint
Corey Nachreiner
Director of Security Strategy and Research at WatchGuard Technologies
Kai Roer
Senior Partner at The Roer Group
Jason Sabin
VP of Research & Development at DigiCert
Ramil Yafizov
Systems Engineer at Nominum

Who are you?

PDF download
Read issue 42 now
Share

Table of contents

  • Six infosec tips I learned from Game of Thrones
  • Dissecting the newly-discovered desire for control and privacy
  • Incident response and failure of the “Just Fix It” attitude
  • How to learn information security
  • Who are you? The impact of security breaches on authentication
  • Thecus N5550 NAS Server inside and out
  • Report: Hack In The Box Amsterdam 2014
  • Ensuring the integrity of Rostelecom’s Wi-Fi network
  • What inspired you to start hacking?
  • Beyond Heartbleed: Closing SSL implementation gaps within our own networks
  • Ironclad incident response
  • Hands-on fun at HacKid 2014
  • Are you ready for the day that prevention fails?
  • Why privacy engineering is needed

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue