ISSUE 48 (December 2015)
Ivan Ristic and <strong>SSL Labs</strong>
Issue 48 Contributors
Andrew Ginter
VP of Industrial Security at Waterfall Security Solutions
Carl Herberger
VP Security Solutions at Radware
Brian Honan
CEO at BH Consulting
Matt Jones
Partner at Elttam
Wolfgang Kandek
CTO at Qualys
Ganesh Kirti
CTO at Palerra
Zoran Lalic
Senior Security Engineer at a large corporation
James J. Treinen
VP, Security Research at ProtectWise
VP, Solutions Strategy for NetIQ, the security practice of MicroFocus

Ivan Ristic and <strong>SSL Labs</strong>

PDF download
Read issue 48 now

Table of contents

  • Ivan Ristic and SSL Labs: How one man changed the way we understand SSL
  • Review: Change and configuration auditing with Netwrix Auditor 7.0
  • How things change: Secure remote access to industrial control systems
  • Developing and implementing an information security program
  • Applying machine learning techniques on contextual data for threat detection
  • Why governments need to take the lead in cybersecurity
  • How talking to recognition technologies will change us
  • Why I recommend Chrome to family
  • Inside the largely unexplored world of mainframe security
  • The Lord of the Hacktivist Rings
  • Minutes matter: Why detection, visibility and response are critical in the post-prevention era
  • Web application fingerprinting with Blind Elephant

(IN)SECURE Magazine archive

ISSUE 66(June, 2020)

  • Let’s be realistic about our expectations of AI
  • Full-time bug hunting: Pros and cons of an emerging career
  • Crowdsourced pentesting is not without its issues
go to issue

ISSUE 65.5(March, 2020)

More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center in San Francisco to explore the Human Element in cybersecurity through hundreds of keynote presentations, track sessions, tutorials, seminars and special events.

go to issue

ISSUE 65(February, 2020)

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue