ISSUE 43 (September 2014)
The value of certification
ISSUE 43
Issue 43 Contributors
Andreas Baumhof
CTO at ThreatMetrix
John Colley
Managing Director for EMEA at (ISC)2
Stephen Dodson
CTO at Prelert
Brian Honan
CEO of BH Consulting, Founder and Head of IRISSCERT
Adam Maxwell
Security researcher
Dwayne Melancon
Director of Security Research at Lancope
Corey Nachreiner
Director of Security Strategy and Research at WatchGuard Technologies
Steve Pate
Chief Architect at HyTrust
Mike Raggo
Security Evangelist at MobileIron
Giovanni Vigna
CTO of Lastline

The value of certification

PDF download
Read issue 43 now
Share

Table of contents

  • How to tell if your security system has been fingerprinted by evasive malware
  • Mobile hackers look to the network
  • Why every security-conscious organization needs a honeypot
  • Securing the U.S. electrical grid
  • Using Hollywood to improve your security program
  • How a large ISP fights DDoS attacks with a custom solution
  • Black Hat USA 2014
  • The synergy of hackers and tools at the Black Hat Arsenal
  • Web application security today
  • Big Data analytics to the rescue
  • Why now is the time for enterprises to implement context-based authentication
  • HoneyMalt: Mapping honeypots using Maltego
  • Failure is an option
  • Cloud security: Do you know where your data is?

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue