ISSUE 70 (November 2021)
Risky business
Issue 70 Contributors
Dan Anconina
CISO & Operations Technology Leader, XM Cyber
Stephen Cavey
Chief Evangelist, Ground Labs
Darren Fields
Regional Vice President Cloud Networking EMEA, Citrix
Sascha Giese
Head Geek, SolarWinds
Jon Hencinski
Director of Global Operations, Expel
Thomas Mackenzie
CEO, RankedRight
Raz Rafaeli
CEO, Secret Double Octopus
Chris Rouland
CEO, Phosphorus Cybersecurity
Faiz Shuja
Co-founder, SIRP
Brian Vermeer
Developer Advocate, Snyk
Ning Wang
CEO, Offensive Security
Mike Welch
Managing Director of Strategy and Risk, MorganFranklin Consulting

Risky business

PDF download
Read issue 70 now

Table of contents

  • How to develop a skilled cybersecurity team
  • Securing your WordPress website against ransomware attacks
  • The warning signs of burnout and how to deal with it
  • How to prevent corporate credentials ending up on the dark web
  • Risky business: Steps for building an effective GRC program
  • ​A ​remedial approach to destructive IoT hacks
  • Zero trust: Bringing security up to speed for the “work-from-anywhere” age
  • What is the HIPAA Security Rule? Three safeguards to have in place
  • Why automated pentesting won’t fix the cybersecurity skills gap
  • What are the post-pandemic security concerns for IT pros and their organizations
  • Vulnerability management is facing three core problems: Here’s how to solve them
  • How building a world class SOC can alleviate security team burnout
  • Top tips for preventing SQL injection attacks

(IN)SECURE Magazine archive More →

ISSUE 72(July, 2022 )
  • 7 threat detection challenges CISOs face and what they can do about it
  • How to set up a powerful insider threat program
  • An offensive mindset is crucial for effective cyber defense
go to issue
ISSUE 71.5(June, 2022 )

Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and more.

go to issue
ISSUE 71(March, 2022 )
  • Why security strategies need a new perspective
  • The evolution of security analytics
  • Open-source code: How to stay secure while moving fast
go to issue