ISSUE 57 (March 2018)
Security best practices
ISSUE 57
Issue 57 Contributors
Anup Ghosh
Chief Strategist, Next Gen Endpoint, Sophos
David Hatchell
Vice President Of Industrial Security, ProtectWise
Doron Kolton
Chief Strategy Officer – Emerging Technologies, Fidelis Cybersecurity
Zoran Lalic
Enterprise Security Architect at a software company
Ruoting Sun
Head of Technology Partnerships, Duo Security
Brad Taylor
CEO, Proficio

Security best practices

PDF download
Read issue 57 now
Share

Table of contents

  • Achieving zero false positives with intelligent deception
  • Expected changes in IT/OT convergence and industrial security
  • Testing machine learning products requires a new approach
  • Why do we need a risk-based approach to authentication?
  • Healthcare organizations and the cloud: Benefits, risks, and security best practices
  • A deep dive into blockchain and Bitcoin

(IN)SECURE Magazine archive

ISSUE 65.5(March, 2020)

More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center in San Francisco to explore the Human Element in cybersecurity through hundreds of keynote presentations, track sessions, tutorials, seminars and special events.

go to issue

ISSUE 65(February, 2020)

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue

    ISSUE 64(December, 2019)

    • Could audio warnings augment your ability to fight off cyberattacks?
    • Your supplier’s BEC problem is your BEC problem
    • Unmask cybercriminals through identity attribution
    • Want to build a SOC? Here is what you need to know beforehand
    go to issue