ISSUE 45 (March 2015)
The Internet of <strong>threats</strong>
ISSUE 45
Issue 45 Contributors
Michael Boelen
Founder of CISOfy
Chase Cunningham
CTO at CynjaTech
Dr. Chris Edwards
CTO at Intercede
Jason Hart
Vice President, Cloud Solutions for Identity & Data Protection, Gemalto
Richard Henderson
Security Strategist at Fortinet’s FortiGuard Labs
Numaan Huq
Member of the Trend Micro threat research team
Ken Kartsen
Senior Vice President of Federal at Intel Security
Slawek Ligier
Vice President of Product Development at Barracuda
Raj Samani
Vice President and CTO, EMEA, Intel Security
JD Sherry
Vice President, Technology & Solutions for Trend Micro
Neha Thethi
Information Security Analyst at BH Consulting
Wes Withrow
IT GRC Subject Matter Expert at TraceSecurity

The Internet of <strong>threats</strong>

PDF download
Read issue 45 now
Share

Table of contents

  • How do we ensure the Security of Things in light of the Internet of Threats?
  • Security and compliance: A balancing act of inequalities
  • Which kind of security professional are you?
  • The derived credential: delivering digital security to a mobile world
  • Declaring personal data bankruptcy and the cost of privacy
  • Total threat protection: Myth and reality
  • DevOps vs security: Can Docker make a difference?
  • Best practices for securing PoS systems
  • Challenges faced by global network professionals
  • Who are the role models in cyberspace?
  • Tackling today’s authentication complexities

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue