ISSUE 42 (June 2014)
Who are you?
Issue 42 Contributors
Chuck Archer
CEO and Executive Chairman of Covata USA
Christiaan Brand
co-founder and CTO of Entersekt
Tom Cross
Director of Security Research at Lancope
Chris Hoff
VP, Strategic Planning – Security Business Unit at Juniper Networks
Mike Horn
Vice President of Threat and Response Products at Proofpoint
Corey Nachreiner
Director of Security Strategy and Research at WatchGuard Technologies
Kai Roer
Senior Partner at The Roer Group
Jason Sabin
VP of Research & Development at DigiCert
Ramil Yafizov
Systems Engineer at Nominum

Who are you?

PDF download
Read issue 42 now

Table of contents

  • Six infosec tips I learned from Game of Thrones
  • Dissecting the newly-discovered desire for control and privacy
  • Incident response and failure of the “Just Fix It” attitude
  • How to learn information security
  • Who are you? The impact of security breaches on authentication
  • Thecus N5550 NAS Server inside and out
  • Report: Hack In The Box Amsterdam 2014
  • Ensuring the integrity of Rostelecom’s Wi-Fi network
  • What inspired you to start hacking?
  • Beyond Heartbleed: Closing SSL implementation gaps within our own networks
  • Ironclad incident response
  • Hands-on fun at HacKid 2014
  • Are you ready for the day that prevention fails?
  • Why privacy engineering is needed

(IN)SECURE Magazine archive

ISSUE 66(June, 2020)

  • Let’s be realistic about our expectations of AI
  • Full-time bug hunting: Pros and cons of an emerging career
  • Crowdsourced pentesting is not without its issues
go to issue

ISSUE 65.5(March, 2020)

More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center in San Francisco to explore the Human Element in cybersecurity through hundreds of keynote presentations, track sessions, tutorials, seminars and special events.

go to issue

ISSUE 65(February, 2020)

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue