ISSUE 52 (December 2016)
ICS security
ISSUE 52
Issue 52 Contributors
Wieland Alge
VP & GM EMEA at Barracuda Networks
Jack Danahy
CTO at Barkly
Andrew Ginter
VP of Industrial Security at Waterfall Security Solutions
Zoran Lalic
Chief Risk Officer at CyberVue
Jeff Schilling
Chief of Operations and Security at Armor
John Schuch
Senior Architect and Security Practice Lead at Gorilla Logic
Gary Sockrider
Principal Security Technologist at Arbor Networks
Emily Wilson
Director of Analysis at Terbium Labs
Elad Yoran
Executive Chairman at KoolSpan
David Zahn
GM of Cybersecurity at PAS

ICS security

PDF download
Read issue 52 now
Share

Table of contents

  • SCADA cybersecurity: A long history of errors
  • Healthcare security: Combating advanced threats
  • Don’t let your security education and awareness to take the back seat
  • The devil is in the details: What your metadata says about you
  • ICS cybersecurity: Futurism vs the here and now
  • Will cybersecurity change with a change in administration?
  • Review: IS Decisions UserLock
  • “Build security in from the start” for app developers
  • Executive hot seat: Lior Frenkel, CEO at Waterfall Security Solutions
  • Narrowing the attack surface: A strategic approach to security
  • Black Friday sales and enterprise data: Compromised information on the dark web
  • Commonly overlooked threat vectors
  • Kaspersky Lab sets up a global ICS-CERT
  • A checklist for people who understand cyber security.

(IN)SECURE Magazine archive

ISSUE 65.5(March, 2020)

More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center in San Francisco to explore the Human Element in cybersecurity through hundreds of keynote presentations, track sessions, tutorials, seminars and special events.

go to issue

ISSUE 65(February, 2020)

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue

    ISSUE 64(December, 2019)

    • Could audio warnings augment your ability to fight off cyberattacks?
    • Your supplier’s BEC problem is your BEC problem
    • Unmask cybercriminals through identity attribution
    • Want to build a SOC? Here is what you need to know beforehand
    go to issue