ISSUE 9 (December 2006)
Virtual trust
Issue 9 Contributors
Kenneth F. Belva
CISSP, CEH, CISM at Credit Industriel et Commercial
Todd Bundy
Director of Business Development and Alliances at ADVA Optical Networking
Rob Faber
Infrastructure architect and senior engineer
Dr. Peter Komisarczuk
Teaches and researches at Victoria University of Wellington
Ulf T. Mattsson
CTO of Protegrity
Dmitry Nefedov
Chief Software Developer at ElcomSoft
Christian Seifert
PhD student at Victoria University of Wellington
Shreeraj Shah
Founder of Net-Square
Dr. Ian Welch
Teaches and researches at Victoria University of Wellington

Virtual trust

PDF download
Read issue 9 now

Table of contents

  • Effectiveness of security by admonition: a case study of security warnings in a web browser setting
  • Interview with Kurt Sauer, CSO at Skype
  • Web 2.0 defense with AJAX fingerprinting and filtering
  • Hack In The Box Security Conference 2006
  • Where iSCSI fits in enterprise storage networking
  • Recovering user passwords from cached domain records
  • Do portable storage solutions compromise business security?
  • Enterprise data security – a case study
  • Creating business through virtual trust: how to gain and sustain a competitive advantage using information security

(IN)SECURE Magazine archive

ISSUE 68(March, 2021)

  • Physical cyber threats: What do criminals leave when they break in?
  • Review: Group-IB Fraud Hunting Platform
  • Tips for boosting the “Sec” part of DevSecOps
go to issue

ISSUE 67(November, 2020)

  • Hardware security: Emerging attacks and protection mechanisms
  • Justifying your 2021 cybersecurity budget
  • Cooking up secure code: A foolproof recipe for open source
  • Mapping the motives of insider threats
go to issue

ISSUE 66(June, 2020)

  • Let’s be realistic about our expectations of AI
  • Full-time bug hunting: Pros and cons of an emerging career
  • Crowdsourced pentesting is not without its issues
go to issue