ISSUE 65 (February 2020)
2020 and beyond
ISSUE 65
Issue 65 Contributors
Galina Antova
Chief Business Development Officer, Claroty
Michael Campbell
Head of Government and Federal Business, Privoro
Marcus Chung
CEO, BoldCloud
Charles Eagan
CTO, BlackBerry
Jason M. Fung
Offensive Security Research Manager, Intel
Dyann Heward-Mills
CEO, HewardMills
Arun Kanuparthi
Offensive Security Researcher, Intel
Hareesh Khattri
Offensive Security Researcher, Intel
Jason Lawlor
President, Lightship Security
Nathan Palmer
Security Researcher, Raytheon’s Cyber Offensive and Defensive group
Michael Schenck
Director of Security Services, Kaytuso

2020 and beyond

PDF download
Read issue 65 now
Share

Table of contents

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Burner phones are an eavesdropping risk for international travelers
  • Hardware hacks: The next generation of cybercrime
  • California’s IoT cybersecurity bill: What it gets right and wrong
  • 7 signs your cybersecurity is doomed to fail in 2020
  • How to test employee cyber competence through pentesting
  • Smart cities are on the rise: What are the dangers?
  • Modern security product certification best practices
  • Why outsourcing your DPO is an effective insurance policy

(IN)SECURE Magazine archive

ISSUE 65.5(March, 2020)

More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center in San Francisco to explore the Human Element in cybersecurity through hundreds of keynote presentations, track sessions, tutorials, seminars and special events.

go to issue

ISSUE 65(February, 2020)

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue

    ISSUE 64(December, 2019)

    • Could audio warnings augment your ability to fight off cyberattacks?
    • Your supplier’s BEC problem is your BEC problem
    • Unmask cybercriminals through identity attribution
    • Want to build a SOC? Here is what you need to know beforehand
    go to issue