ISSUE 47 (September 2015)
Redefining Security
ISSUE 47
Issue 47 Contributors
Florian Eichelberger
Information Systems Auditor at Cognosec
Gonen Fink
CEO at LightCyber
Brian Honan
CEO at BH Consulting
Eric D. Knapp
Expert in industrial control systems cyber security
Rupesh Kumar
Director of Lepide Software
Dave Larson
CTO at Corero Network Security
Ulf T. Mattsson
CTO at Protegrity
Eddie Mitchell
Principal Solutions Architect at CSG Invotas
Gavin Reid
Vice President of Threat Intelligence at Lancope
Oliver Tavakoli
CTO at Vectra Networks

Redefining Security

PDF download
Read issue 47 now
Share

Table of contents

  • Redefining security visualization with Hollywood UI design
  • Best practices for ensuring compliance in the age of cloud computing
  • The evolution of DDoS and how ISPs can respond
  • NowSecure Lab cloud: Mobile app assessment environment
  • Why vulnerability disclosure shouldn’t be a marketing tool
  • Report: Black Hat USA 2015
  • We don’t know what we don’t know
  • Outdated protocols put IoT revolution at risk
  • The challenges of implementing tokenization in a medium-sized enterprise
  • Automated threat management: No signature required
  • Re-thinking security to detect active data breaches
  • How to prevent insider threats in your organization
  • ISO/IEC 27001 scoping and beyond
  • Combatting human error in cybersecurity
  • Threat intelligence matters to everyone

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue