ISSUE 64 (December 2019)
Reevaluating cyber threats
ISSUE 64
Issue 64 Contributors
Bob Carver
Principal Cybersecurity Threat Intelligence and Analytics, Verizon
Amyn Gilani
VP of Product, 4iQ
Phillip Maddux
Principal Application Security Researcher & Advisor, Signal Sciences
Kevin O’Brien
CEO, GreatHorn
Nimmy Reichenberg
Chief Strategy Officer, Siemplify
Matthew Rosenquist
Independent Cybersecurity Strategist
Danny Thompson
SVP of Market and Product Strategy, APEX Analytix
Ed Williams
EMEA Director of SpiderLabs, Trustwave

Reevaluating cyber threats

PDF download
Read issue 64 now
Share

Table of contents

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Product Showcase: SpyCloud Active Directory Guardian
  • Unmask cybercriminals through identity attribution
  • Phishing attacks are a complex problem that requires layered solutions
  • Winning the security fight: Tips for organizations and CISOs
  • Want to build a SOC? Here is what you need to know beforehand
  • Product showcase: Alsid for AD
  • When is the right time to red team?
  • IoT is an ecosystem, as secure as its weakest link

Sponsors

Interesting in becoming magazine sponsor? Click here

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue