ISSUE 51 (September 2016)
Securing your spot at the top
Issue 51 Contributors
Babak D. Beheshti
Associate Dean of the School of Engineering and Computing Sciences at NYIT
Clyde Bennett
Chief Healthcare Technology Strategist at Aldridge Health
Ross Brewer
VP and MD of EMEA at LogRhythm
Ben Desjardins
Director of Security Solutions at Radware
Eric O’Neill
National Security Strategist at Carbon Black
Jeff Schilling
Chief of Operations and Security at Armor
Karl Sigler
Threat Intelligence Manager at Trustwave
Sigurdur Stefnisson
VP of Threat Research at CYREN
Amos Stern
CEO at Siemplify
Ronen Yehoshua
CEO at Morphisec

Securing your spot at the top

PDF download
Read issue 51 now

Table of contents

  • Hacking is the new espionage
  • New hyper-evasive threats are killing sandboxing as we know it
  • How to choose a perfect data control solution for your enterprise
  • What can Microsoft Patch Tuesday tell us about security trends in 2016?
  • Security experts are from Mars, business owners are from Venus
  • Report: Black Hat USA 2016
  • Build your own endpoint security stack
  • Securing your spot at the top: How to collaborate and when to compete
  • Shift from detection to response requires rethinking security infrastructure
  • Is your business still HIPAA complaint after the 2016 federal changes?
  • Encryption for the Internet of Things
  • Preparing for new EU cyber-security rules and regulations.

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue