ISSUE 51 (September 2016)
Securing your spot at the top
Issue 51 Contributors
Babak D. Beheshti
Associate Dean of the School of Engineering and Computing Sciences at NYIT
Clyde Bennett
Chief Healthcare Technology Strategist at Aldridge Health
Ross Brewer
VP and MD of EMEA at LogRhythm
Ben Desjardins
Director of Security Solutions at Radware
Eric O’Neill
National Security Strategist at Carbon Black
Jeff Schilling
Chief of Operations and Security at Armor
Karl Sigler
Threat Intelligence Manager at Trustwave
Sigurdur Stefnisson
VP of Threat Research at CYREN
Amos Stern
CEO at Siemplify
Ronen Yehoshua
CEO at Morphisec

Securing your spot at the top

PDF download
Read issue 51 now

Table of contents

  • Hacking is the new espionage
  • New hyper-evasive threats are killing sandboxing as we know it
  • How to choose a perfect data control solution for your enterprise
  • What can Microsoft Patch Tuesday tell us about security trends in 2016?
  • Security experts are from Mars, business owners are from Venus
  • Report: Black Hat USA 2016
  • Build your own endpoint security stack
  • Securing your spot at the top: How to collaborate and when to compete
  • Shift from detection to response requires rethinking security infrastructure
  • Is your business still HIPAA complaint after the 2016 federal changes?
  • Encryption for the Internet of Things
  • Preparing for new EU cyber-security rules and regulations.

(IN)SECURE Magazine archive More →

ISSUE 72(July, 2022 )
  • 7 threat detection challenges CISOs face and what they can do about it
  • How to set up a powerful insider threat program
  • An offensive mindset is crucial for effective cyber defense
go to issue
ISSUE 71.5(June, 2022 )

Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and more.

go to issue
ISSUE 71(March, 2022 )
  • Why security strategies need a new perspective
  • The evolution of security analytics
  • Open-source code: How to stay secure while moving fast
go to issue