ISSUE 43 (September 2014)
The value of certification
ISSUE 43
Issue 43 Contributors
Andreas Baumhof
CTO at ThreatMetrix
John Colley
Managing Director for EMEA at (ISC)2
Stephen Dodson
CTO at Prelert
Brian Honan
CEO of BH Consulting, Founder and Head of IRISSCERT
Adam Maxwell
Security researcher
Dwayne Melancon
Director of Security Research at Lancope
Corey Nachreiner
Director of Security Strategy and Research at WatchGuard Technologies
Steve Pate
Chief Architect at HyTrust
Mike Raggo
Security Evangelist at MobileIron
Giovanni Vigna
CTO of Lastline

The value of certification

PDF download
Read issue 43 now
Share

Table of contents

  • How to tell if your security system has been fingerprinted by evasive malware
  • Mobile hackers look to the network
  • Why every security-conscious organization needs a honeypot
  • Securing the U.S. electrical grid
  • Using Hollywood to improve your security program
  • How a large ISP fights DDoS attacks with a custom solution
  • Black Hat USA 2014
  • The synergy of hackers and tools at the Black Hat Arsenal
  • Web application security today
  • Big Data analytics to the rescue
  • Why now is the time for enterprises to implement context-based authentication
  • HoneyMalt: Mapping honeypots using Maltego
  • Failure is an option
  • Cloud security: Do you know where your data is?

(IN)SECURE Magazine archive

ISSUE 66(June, 2020)

  • Let’s be realistic about our expectations of AI
  • Full-time bug hunting: Pros and cons of an emerging career
  • Crowdsourced pentesting is not without its issues
go to issue

ISSUE 65.5(March, 2020)

More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center in San Francisco to explore the Human Element in cybersecurity through hundreds of keynote presentations, track sessions, tutorials, seminars and special events.

go to issue

ISSUE 65(February, 2020)

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue