ISSUE 49 (February 2016)
Privacy by design
ISSUE 49
Issue 49 Contributors
Ben Desjardins
Director of Security Solutions at Radware
Wolfgang Kandek
CTO at Qualys
Tom Kellermann
Chief Cybersecurity Officer at Trend Micro
John Kuhn
Senior Threat Researcher at IBM X-Force
Zoran Lalic
Senior Security Engineer at a large corporation
Fan Lei
Information Security Manager of Americas at Takeda Pharmaceuticals
John Smith
Principal Solution Architect at Veracode
Shay Zandani
Founder and CEO of Cytegic

Privacy by design

PDF download
Read issue 49 now
Share

Table of contents

  • Privacy by design: What it is and where to build it
  • Harnessing artificial intelligence to build an army of virtual analysts
  • Building and implementing an incident response program from scratch
  • Take it to the boardroom: Elevating the cybersecurity discussion
  • Cyber security control maturity: What it is, and why you should care
  • Have I been hacked? The indicators that suggest you have
  • Demanding accountability: The need for cyber liability
  • Adding the cloud to your rainy day plan
  • The slings and arrows of encryption technology

(IN)SECURE Magazine archive

ISSUE 66(June, 2020)

  • Let’s be realistic about our expectations of AI
  • Full-time bug hunting: Pros and cons of an emerging career
  • Crowdsourced pentesting is not without its issues
go to issue

ISSUE 65.5(March, 2020)

More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center in San Francisco to explore the Human Element in cybersecurity through hundreds of keynote presentations, track sessions, tutorials, seminars and special events.

go to issue

ISSUE 65(February, 2020)

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue