ISSUE 63 (September 2019)
CISO challenges
ISSUE 63
Issue 63 Contributors
Randy Barr
CISO, Topia
Catherine Chambers
Senior Product Manager, Irdeto
Jim Ducharme
VP of Identity Products, RSA Security
Julie Haney
Co-lead, NIST Usable Cybersecurity team
Vlatko Kosturjak
Security Researcher
Matt Lock
Technical Director, Varonis
Nimmy Reichenberg
Chief Strategy Officer, Siemplify
Mark Sangster
VP & Industry Security Strategist, eSentire
Charlie Sander
CEO, ManagedMethods
Motti Sorani
CTO, CyberMDX
Mary Theofanos
Co-lead, NIST Usable Cybersecurity team

CISO challenges

PDF download
Read issue 63 now
Share

Table of contents

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
  • What the education industry must do to protect itself from cyber attacks
  • Solving security problems: Security advice for those with limited resources
  • Review: Specops uReset
  • True passwordless authentication is still quite a while away
  • Six criteria for choosing the right security orchestration vendor
  • Ensuring supply chain security: 5 IT strategies for choosing vendors wisely
  • Have you thought about the often-overlooked mobile app threat?

(IN)SECURE Magazine archive

ISSUE 66(June, 2020)

  • Let’s be realistic about our expectations of AI
  • Full-time bug hunting: Pros and cons of an emerging career
  • Crowdsourced pentesting is not without its issues
go to issue

ISSUE 65.5(March, 2020)

More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center in San Francisco to explore the Human Element in cybersecurity through hundreds of keynote presentations, track sessions, tutorials, seminars and special events.

go to issue

ISSUE 65(February, 2020)

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue