ISSUE 69 (July 2021)
Cyber skills
ISSUE 69
Issue 69 Contributors
Bobby Christian
COO, Deepwatch
Pieter Danhieux
Chairman/CEO, Secure Code Warrior
Ameesh Divatia
CEO, Baffle
Heather Gantt-Evans
CISO, SailPoint
Toni Grzinic
Security Researcher
Anne Hardy
CISO, Talend
Mike Heredia
VP EMEA & APAC, XM Cyber
Mike Jumper
CEO, Glyptodon
Patrick MeLampy
Juniper Fellow, Juniper Networks
Todd Moore
VP of Encryption Solutions, Thales
Juan Pablo Perez-Etchegoyen
CTO, Onapsis
Aare Reintam
CTO, CybExer Technologies
Brian Satira
Chief Hacking Officer, Redoubt Research

Cyber skills

PDF download
Read issue 69 now
Share

Table of contents

  • Why threat hunting is obsolete without context
  • Review: Group-IB Threat Hunting Framework
  • Navigating the waters of maritime cybersecurity
  • Defending against Windows RDP attacks
  • The evolution of the modern CISO
  • Understanding the cloud shared responsibility model
  • Why is patch management so difficult to master?
  • Preventing security issues from destroying the promise of IoT
  • Reformulating the cyber skills shortage
  • Cybersecurity industry analysis: Another recurring vulnerability we must correct
  • For CISOs and artificial intelligence to evolve, trust is a must
  • Quantum computing is imminent, and enterprises need crypto agility now
  • When the adversarial view of the attack surface is missing, digital transformation becomes riskier

(IN)SECURE Magazine archive

ISSUE 71.5(June, 2022)

Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and more.

go to issue

ISSUE 71(March, 2022)

  • Why security strategies need a new perspective
  • The evolution of security analytics
  • Open-source code: How to stay secure while moving fast
go to issue

ISSUE 70(November, 2021)

  • How to develop a skilled cybersecurity team
  • Securing your WordPress website against ransomware attacks
  • How to prevent corporate credentials ending up on the dark web
go to issue