ISSUE 47 (September 2015)
Redefining Security
ISSUE 47
Issue 47 Contributors
Florian Eichelberger
Information Systems Auditor at Cognosec
Gonen Fink
CEO at LightCyber
Brian Honan
CEO at BH Consulting
Eric D. Knapp
Expert in industrial control systems cyber security
Rupesh Kumar
Director of Lepide Software
Dave Larson
CTO at Corero Network Security
Ulf T. Mattsson
CTO at Protegrity
Eddie Mitchell
Principal Solutions Architect at CSG Invotas
Gavin Reid
Vice President of Threat Intelligence at Lancope
Oliver Tavakoli
CTO at Vectra Networks

Redefining Security

PDF download
Read issue 47 now
Share

Table of contents

  • Redefining security visualization with Hollywood UI design
  • Best practices for ensuring compliance in the age of cloud computing
  • The evolution of DDoS and how ISPs can respond
  • NowSecure Lab cloud: Mobile app assessment environment
  • Why vulnerability disclosure shouldn’t be a marketing tool
  • Report: Black Hat USA 2015
  • We don’t know what we don’t know
  • Outdated protocols put IoT revolution at risk
  • The challenges of implementing tokenization in a medium-sized enterprise
  • Automated threat management: No signature required
  • Re-thinking security to detect active data breaches
  • How to prevent insider threats in your organization
  • ISO/IEC 27001 scoping and beyond
  • Combatting human error in cybersecurity
  • Threat intelligence matters to everyone

(IN)SECURE Magazine archive

ISSUE 65.5(March, 2020)

More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center in San Francisco to explore the Human Element in cybersecurity through hundreds of keynote presentations, track sessions, tutorials, seminars and special events.

go to issue

ISSUE 65(February, 2020)

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue

    ISSUE 64(December, 2019)

    • Could audio warnings augment your ability to fight off cyberattacks?
    • Your supplier’s BEC problem is your BEC problem
    • Unmask cybercriminals through identity attribution
    • Want to build a SOC? Here is what you need to know beforehand
    go to issue