ISSUE 49 (February 2016)
Privacy by design
ISSUE 49
Issue 49 Contributors
Ben Desjardins
Director of Security Solutions at Radware
Wolfgang Kandek
CTO at Qualys
Tom Kellermann
Chief Cybersecurity Officer at Trend Micro
John Kuhn
Senior Threat Researcher at IBM X-Force
Zoran Lalic
Senior Security Engineer at a large corporation
Fan Lei
Information Security Manager of Americas at Takeda Pharmaceuticals
John Smith
Principal Solution Architect at Veracode
Shay Zandani
Founder and CEO of Cytegic

Privacy by design

PDF download
Read issue 49 now
Share

Table of contents

  • Privacy by design: What it is and where to build it
  • Harnessing artificial intelligence to build an army of virtual analysts
  • Building and implementing an incident response program from scratch
  • Take it to the boardroom: Elevating the cybersecurity discussion
  • Cyber security control maturity: What it is, and why you should care
  • Have I been hacked? The indicators that suggest you have
  • Demanding accountability: The need for cyber liability
  • Adding the cloud to your rainy day plan
  • The slings and arrows of encryption technology

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue