ISSUE 60 (December 2018)
Building strategies
ISSUE 60
Issue 60 Contributors
Edward Amoroso
CEO, TAG Cyber
Jonathan Bohrer
CFO, Abacus Group
Mark Bower
CRO, Egress Software
Andrew Ginter
Vice President of Industrial Security, Waterfall Security
Sean Mason
Director of Threat Management and Incident Response, Cisco
Josh Mayfield
Director of Security Strategy, Absolute
Gadi Naor
CTO, Alcide
Vlatko Košturjak
Security Researcher
Sean Walls
Vice President, Eurofins Cyber Security

Building strategies

PDF download
Read issue 60 now
Share

Table of contents

  • How to make the CFO your best cybersecurity friend
  • Review: Specops Password Policy
  • Break out of malware myopia by focusing on the fundamentals
  • Securing our future in the age of IoT
  • Blind spots and how to see them: Observability in a serverless environment
  • There are no real shortcuts to most security problems
  • Bridging the priority gap between IT and security in DevOps
  • Are you ready? A good incident response plan can protect your organization
  • Privacy laws do not understand human error: Securing unstructured data in the age of data privacy regulations
  • The future of OT security in critical infrastructure.

(IN)SECURE Magazine archive

ISSUE 66(June, 2020)

  • Let’s be realistic about our expectations of AI
  • Full-time bug hunting: Pros and cons of an emerging career
  • Crowdsourced pentesting is not without its issues
go to issue

ISSUE 65.5(March, 2020)

More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center in San Francisco to explore the Human Element in cybersecurity through hundreds of keynote presentations, track sessions, tutorials, seminars and special events.

go to issue

ISSUE 65(February, 2020)

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue