ISSUE 60 (December 2018)
Building strategies
Issue 60 Contributors
Edward Amoroso
CEO, TAG Cyber
Jonathan Bohrer
CFO, Abacus Group
Mark Bower
CRO, Egress Software
Andrew Ginter
Vice President of Industrial Security, Waterfall Security
Sean Mason
Director of Threat Management and Incident Response, Cisco
Josh Mayfield
Director of Security Strategy, Absolute
Gadi Naor
CTO, Alcide
Vlatko Košturjak
Security Researcher
Sean Walls
Vice President, Eurofins Cyber Security

Building strategies

PDF download
Read issue 60 now

Table of contents

  • How to make the CFO your best cybersecurity friend
  • Review: Specops Password Policy
  • Break out of malware myopia by focusing on the fundamentals
  • Securing our future in the age of IoT
  • Blind spots and how to see them: Observability in a serverless environment
  • There are no real shortcuts to most security problems
  • Bridging the priority gap between IT and security in DevOps
  • Are you ready? A good incident response plan can protect your organization
  • Privacy laws do not understand human error: Securing unstructured data in the age of data privacy regulations
  • The future of OT security in critical infrastructure.

(IN)SECURE Magazine archive

ISSUE 70(November, 2021)

  • How to develop a skilled cybersecurity team
  • Securing your WordPress website against ransomware attacks
  • How to prevent corporate credentials ending up on the dark web
go to issue

ISSUE 69(July, 2021)

  • Why threat hunting is obsolete without context
  • Defending against Windows RDP attacks
  • Navigating the waters of maritime cybersecurity
go to issue

ISSUE 68(March, 2021)

  • Physical cyber threats: What do criminals leave when they break in?
  • Review: Group-IB Fraud Hunting Platform
  • Tips for boosting the “Sec” part of DevSecOps
go to issue