ISSUE 61 (February 2019)
Managing cyber risk
ISSUE 61
Issue 61 Contributors
Mike Burg
Director of Strategic Advisory, Alagen
Jon Fielding
EMEA Managing Director, Apricorn
Dean Dysman
CEO, Axonius
Keith Bromley
Sr. Manager, Solutions, Keysight
Meny Har
VP of Products, Siemplify
Andrea Little Limbago
Chief Social Scientist, Virtru
Brendan Patterson
VP of Product Management, WatchGuard Technologies

Managing cyber risk

PDF download
Read issue 61 now
Share

Table of contents

  • How to know when you’re ready for a fractional CISO
  • Debunking conventional wisdom to get out of the security and privacy rut
  • How accepting that your network will get hacked will help you develop a plan to recover faster
  • Four differences between the GDPR and the California Consumer Privacy Act
  • 5 reasons why asset management is a hot topic in 2019
  • Machine learning trumps AI for security analysts
  • Considering an SD-WAN Deployment? The best solution may already be in your network

(IN)SECURE Magazine archive

ISSUE 65(February, 2020)

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue

    ISSUE 64(December, 2019)

    • Could audio warnings augment your ability to fight off cyberattacks?
    • Your supplier’s BEC problem is your BEC problem
    • Unmask cybercriminals through identity attribution
    • Want to build a SOC? Here is what you need to know beforehand
    go to issue

    ISSUE 63(September, 2019)

    • Identifying evasive threats hiding inside the network
    • Inside the NIST team working to make cybersecurity more user-friendly
    • Report: Black Hat USA 2019
    • Healthcare’s blind spot: Unmanaged IoT and medical devices
    go to issue