ISSUE 51 (September 2016)
Securing your spot at the top
Issue 51 Contributors
Babak D. Beheshti
Associate Dean of the School of Engineering and Computing Sciences at NYIT
Clyde Bennett
Chief Healthcare Technology Strategist at Aldridge Health
Ross Brewer
VP and MD of EMEA at LogRhythm
Ben Desjardins
Director of Security Solutions at Radware
Eric O’Neill
National Security Strategist at Carbon Black
Jeff Schilling
Chief of Operations and Security at Armor
Karl Sigler
Threat Intelligence Manager at Trustwave
Sigurdur Stefnisson
VP of Threat Research at CYREN
Amos Stern
CEO at Siemplify
Ronen Yehoshua
CEO at Morphisec

Securing your spot at the top

PDF download
Read issue 51 now

Table of contents

  • Hacking is the new espionage
  • New hyper-evasive threats are killing sandboxing as we know it
  • How to choose a perfect data control solution for your enterprise
  • What can Microsoft Patch Tuesday tell us about security trends in 2016?
  • Security experts are from Mars, business owners are from Venus
  • Report: Black Hat USA 2016
  • Build your own endpoint security stack
  • Securing your spot at the top: How to collaborate and when to compete
  • Shift from detection to response requires rethinking security infrastructure
  • Is your business still HIPAA complaint after the 2016 federal changes?
  • Encryption for the Internet of Things
  • Preparing for new EU cyber-security rules and regulations.

(IN)SECURE Magazine archive

ISSUE 66(June, 2020)

  • Let’s be realistic about our expectations of AI
  • Full-time bug hunting: Pros and cons of an emerging career
  • Crowdsourced pentesting is not without its issues
go to issue

ISSUE 65.5(March, 2020)

More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center in San Francisco to explore the Human Element in cybersecurity through hundreds of keynote presentations, track sessions, tutorials, seminars and special events.

go to issue

ISSUE 65(February, 2020)

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue