ISSUE 45

ISSUE 45 (March, 2015)

The Internet of threats

Issue 45 Contributors

Michael Boelen
Founder of CISOfy
Chase Cunningham
CTO at CynjaTech
Dr. Chris Edwards
CTO at Intercede
Jason Hart
Vice President, Cloud Solutions for Identity & Data Protection, Gemalto
Richard Henderson
Security Strategist at Fortinet’s FortiGuard Labs
Numaan Huq
Member of the Trend Micro threat research team
Ken Kartsen
Senior Vice President of Federal at Intel Security
Slawek Ligier
Vice President of Product Development at Barracuda
Raj Samani
Vice President and CTO, EMEA, Intel Security
JD Sherry
Vice President, Technology & Solutions for Trend Micro
Neha Thethi
Information Security Analyst at BH Consulting
Wes Withrow
IT GRC Subject Matter Expert at TraceSecurity

Table of contents

  • How do we ensure the Security of Things in light of the Internet of Threats?
  • Security and compliance: A balancing act of inequalities
  • Which kind of security professional are you?
  • The derived credential: delivering digital security to a mobile world
  • Declaring personal data bankruptcy and the cost of privacy
  • Total threat protection: Myth and reality
  • DevOps vs security: Can Docker make a difference?
  • Best practices for securing PoS systems
  • Challenges faced by global network professionals
  • Who are the role models in cyberspace?
  • Tackling today’s authentication complexities

(IN)SECURE Magazine archive

show all