ISSUE 45 (March 2015)
The Internet of <strong>threats</strong>
ISSUE 45
Issue 45 Contributors
Michael Boelen
Founder of CISOfy
Chase Cunningham
CTO at CynjaTech
Dr. Chris Edwards
CTO at Intercede
Jason Hart
Vice President, Cloud Solutions for Identity & Data Protection, Gemalto
Richard Henderson
Security Strategist at Fortinet’s FortiGuard Labs
Numaan Huq
Member of the Trend Micro threat research team
Ken Kartsen
Senior Vice President of Federal at Intel Security
Slawek Ligier
Vice President of Product Development at Barracuda
Raj Samani
Vice President and CTO, EMEA, Intel Security
JD Sherry
Vice President, Technology & Solutions for Trend Micro
Neha Thethi
Information Security Analyst at BH Consulting
Wes Withrow
IT GRC Subject Matter Expert at TraceSecurity

The Internet of <strong>threats</strong>

PDF download
Read issue 45 now
Share

Table of contents

  • How do we ensure the Security of Things in light of the Internet of Threats?
  • Security and compliance: A balancing act of inequalities
  • Which kind of security professional are you?
  • The derived credential: delivering digital security to a mobile world
  • Declaring personal data bankruptcy and the cost of privacy
  • Total threat protection: Myth and reality
  • DevOps vs security: Can Docker make a difference?
  • Best practices for securing PoS systems
  • Challenges faced by global network professionals
  • Who are the role models in cyberspace?
  • Tackling today’s authentication complexities

(IN)SECURE Magazine archive

ISSUE 71.5(June, 2022)

Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and more.

go to issue

ISSUE 71(March, 2022)

  • Why security strategies need a new perspective
  • The evolution of security analytics
  • Open-source code: How to stay secure while moving fast
go to issue

ISSUE 70(November, 2021)

  • How to develop a skilled cybersecurity team
  • Securing your WordPress website against ransomware attacks
  • How to prevent corporate credentials ending up on the dark web
go to issue