ISSUE 57 (March 2018)
Security best practices
ISSUE 57
Issue 57 Contributors
Anup Ghosh
Chief Strategist, Next Gen Endpoint, Sophos
David Hatchell
Vice President Of Industrial Security, ProtectWise
Doron Kolton
Chief Strategy Officer – Emerging Technologies, Fidelis Cybersecurity
Zoran Lalic
Enterprise Security Architect at a software company
Ruoting Sun
Head of Technology Partnerships, Duo Security
Brad Taylor
CEO, Proficio

Security best practices

PDF download
Read issue 57 now
Share

Table of contents

  • Achieving zero false positives with intelligent deception
  • Expected changes in IT/OT convergence and industrial security
  • Testing machine learning products requires a new approach
  • Why do we need a risk-based approach to authentication?
  • Healthcare organizations and the cloud: Benefits, risks, and security best practices
  • A deep dive into blockchain and Bitcoin

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue