ISSUE 45 (March 2015)
The Internet of <strong>threats</strong>
ISSUE 45
Issue 45 Contributors
Michael Boelen
Founder of CISOfy
Chase Cunningham
CTO at CynjaTech
Dr. Chris Edwards
CTO at Intercede
Jason Hart
Vice President, Cloud Solutions for Identity & Data Protection, Gemalto
Richard Henderson
Security Strategist at Fortinet’s FortiGuard Labs
Numaan Huq
Member of the Trend Micro threat research team
Ken Kartsen
Senior Vice President of Federal at Intel Security
Slawek Ligier
Vice President of Product Development at Barracuda
Raj Samani
Vice President and CTO, EMEA, Intel Security
JD Sherry
Vice President, Technology & Solutions for Trend Micro
Neha Thethi
Information Security Analyst at BH Consulting
Wes Withrow
IT GRC Subject Matter Expert at TraceSecurity

The Internet of <strong>threats</strong>

PDF download
Read issue 45 now
Share

Table of contents

  • How do we ensure the Security of Things in light of the Internet of Threats?
  • Security and compliance: A balancing act of inequalities
  • Which kind of security professional are you?
  • The derived credential: delivering digital security to a mobile world
  • Declaring personal data bankruptcy and the cost of privacy
  • Total threat protection: Myth and reality
  • DevOps vs security: Can Docker make a difference?
  • Best practices for securing PoS systems
  • Challenges faced by global network professionals
  • Who are the role models in cyberspace?
  • Tackling today’s authentication complexities

(IN)SECURE Magazine archive

ISSUE 66(June, 2020)

  • Let’s be realistic about our expectations of AI
  • Full-time bug hunting: Pros and cons of an emerging career
  • Crowdsourced pentesting is not without its issues
go to issue

ISSUE 65.5(March, 2020)

More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center in San Francisco to explore the Human Element in cybersecurity through hundreds of keynote presentations, track sessions, tutorials, seminars and special events.

go to issue

ISSUE 65(February, 2020)

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue