ISSUE 47 (September 2015)
Redefining Security
ISSUE 47
Issue 47 Contributors
Florian Eichelberger
Information Systems Auditor at Cognosec
Gonen Fink
CEO at LightCyber
Brian Honan
CEO at BH Consulting
Eric D. Knapp
Expert in industrial control systems cyber security
Rupesh Kumar
Director of Lepide Software
Dave Larson
CTO at Corero Network Security
Ulf T. Mattsson
CTO at Protegrity
Eddie Mitchell
Principal Solutions Architect at CSG Invotas
Gavin Reid
Vice President of Threat Intelligence at Lancope
Oliver Tavakoli
CTO at Vectra Networks

Redefining Security

PDF download
Read issue 47 now
Share

Table of contents

  • Redefining security visualization with Hollywood UI design
  • Best practices for ensuring compliance in the age of cloud computing
  • The evolution of DDoS and how ISPs can respond
  • NowSecure Lab cloud: Mobile app assessment environment
  • Why vulnerability disclosure shouldn’t be a marketing tool
  • Report: Black Hat USA 2015
  • We don’t know what we don’t know
  • Outdated protocols put IoT revolution at risk
  • The challenges of implementing tokenization in a medium-sized enterprise
  • Automated threat management: No signature required
  • Re-thinking security to detect active data breaches
  • How to prevent insider threats in your organization
  • ISO/IEC 27001 scoping and beyond
  • Combatting human error in cybersecurity
  • Threat intelligence matters to everyone

(IN)SECURE Magazine archive More →

ISSUE 72(July, 2022 )
  • 7 threat detection challenges CISOs face and what they can do about it
  • How to set up a powerful insider threat program
  • An offensive mindset is crucial for effective cyber defense
go to issue
ISSUE 71.5(June, 2022 )

Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and more.

go to issue
ISSUE 71(March, 2022 )
  • Why security strategies need a new perspective
  • The evolution of security analytics
  • Open-source code: How to stay secure while moving fast
go to issue