ISSUE 5 (December 2005)
Web application firewalls
ISSUE 5
Issue 5 Contributors
Ugo Bellavance
Independent consultant
Melisa Bleasdale
Communications consultant
Alessandro Perilli
Founder of False Negatives
Ivan Ristic
Author of ModSecurity
Jon Read, Seth Fogie and Cyrus Peikari
Members of Airscanner Mobile Security Team
Kevin J. Schmidt
Senior software developer at SecureWorks

Web application firewalls

PDF download
Read issue 5 now
Share

Table of contents

  • Web application firewalls primer
  • Review: Trustware BufferZone 1.6
  • Threat analysis using log data
  • Looking back at computer security in 2005
  • Writing an enterprise handheld security policy
  • Digital Rights Management
  • Revenge of the Web mob
  • Hardening Windows Server 2003 platforms made easy
  • Filtering spam server-side

(IN)SECURE Magazine archive

ISSUE 65.5(March, 2020)

More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center in San Francisco to explore the Human Element in cybersecurity through hundreds of keynote presentations, track sessions, tutorials, seminars and special events.

go to issue

ISSUE 65(February, 2020)

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue

    ISSUE 64(December, 2019)

    • Could audio warnings augment your ability to fight off cyberattacks?
    • Your supplier’s BEC problem is your BEC problem
    • Unmask cybercriminals through identity attribution
    • Want to build a SOC? Here is what you need to know beforehand
    go to issue