ISSUE 59 (September 2018)
Success in cybersecurity
ISSUE 59
Issue 59 Contributors
Matt Downing
Principal Threat Intelligence Researcher, Alert Logic
Alex Fagioli
CEO, Tectrade
John Petrie
Global CISO, NTT Security
Aditya K Sood
Director of Cloud Security, Symantec
Tim Woods
VP of Technology Alliances, FireMon

Success in cybersecurity

PDF download
Read issue 59 now
Share

Table of contents

  • The importance of career pathing in the cybersecurity industry
  • Securing healthcare organizations: The challenges CISOs face
  • Fingerprinting HTTP anomalies to dissect malicious operations
  • How to keep cryptominers from opening up your IT container boxes
  • Report: Black Hat USA 2018
  • Vulnerability research and responsible disclosure: Advice from an industry veteran
  • Managing migration mayhem: A roadmap for success
  • For the love of a good IT book: The No Starch Press story
  • Overcoming the threat of ransomware with zero-day recovery
  • Infosec and the future: Dr. Giovanni Vigna on lessons learned over 25 years.

(IN)SECURE Magazine archive

ISSUE 65(February, 2020)

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue

    ISSUE 64(December, 2019)

    • Could audio warnings augment your ability to fight off cyberattacks?
    • Your supplier’s BEC problem is your BEC problem
    • Unmask cybercriminals through identity attribution
    • Want to build a SOC? Here is what you need to know beforehand
    go to issue

    ISSUE 63(September, 2019)

    • Identifying evasive threats hiding inside the network
    • Inside the NIST team working to make cybersecurity more user-friendly
    • Report: Black Hat USA 2019
    • Healthcare’s blind spot: Unmanaged IoT and medical devices
    go to issue