ISSUE 8 (September 2006)
PCI demystified
ISSUE 8
Issue 8 Contributors
Dr. Anton Chuvakin
GCIA, GCIH, GCFA

Michael Dahn
President of Volubis, Inc.
Seth Fogie
Member of the Airscanner Mobile Security Team
Oleg Gudilin
Analyst at Kaspersky Lab
J. Frank Grindstaff, Jr.
CPA, CISA, CIA, CCE, EnCE
Ulf T. Mattsson
CTO of Protegrity
Giuseppe Maxia
Product development manager at SmoothWall

PCI demystified

PDF download
Read issue 8 now
Share

Table of contents

  • Payment Card Industry demystified
  • Skype: how safe is it?
  • Computer forensics vs. electronic evidence
  • Review: Acunetix Web Vulnerability Scanner 4.0
  • SSH port forwarding – security from two perspectives, part two
  • Log management in PCI compliance
  • Airscanner vulnerability summary: Windows Mobile security software fails the test
  • Proactive protection: a panacea for viruses?
  • Introducing the MySQL Sandbox
  • Continuous protection of enterprise data: a comprehensive approach

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue