ISSUE 48 (December 2015)
Ivan Ristic and <strong>SSL Labs</strong>
ISSUE 48
Issue 48 Contributors
Andrew Ginter
VP of Industrial Security at Waterfall Security Solutions
Carl Herberger
VP Security Solutions at Radware
Brian Honan
CEO at BH Consulting
Matt Jones
Partner at Elttam
Wolfgang Kandek
CTO at Qualys
Ganesh Kirti
CTO at Palerra
Zoran Lalic
Senior Security Engineer at a large corporation
James J. Treinen
VP, Security Research at ProtectWise
GeoffWebb
VP, Solutions Strategy for NetIQ, the security practice of MicroFocus

Ivan Ristic and <strong>SSL Labs</strong>

PDF download
Read issue 48 now
Share

Table of contents

  • Ivan Ristic and SSL Labs: How one man changed the way we understand SSL
  • Review: Change and configuration auditing with Netwrix Auditor 7.0
  • How things change: Secure remote access to industrial control systems
  • Developing and implementing an information security program
  • Applying machine learning techniques on contextual data for threat detection
  • Why governments need to take the lead in cybersecurity
  • How talking to recognition technologies will change us
  • Why I recommend Chrome to family
  • Inside the largely unexplored world of mainframe security
  • The Lord of the Hacktivist Rings
  • Minutes matter: Why detection, visibility and response are critical in the post-prevention era
  • Web application fingerprinting with Blind Elephant

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue