ISSUE 9 (December 2006)
Virtual trust
ISSUE 9
Issue 9 Contributors
Kenneth F. Belva
CISSP, CEH, CISM at Credit Industriel et Commercial
Todd Bundy
Director of Business Development and Alliances at ADVA Optical Networking
Rob Faber
Infrastructure architect and senior engineer
Dr. Peter Komisarczuk
Teaches and researches at Victoria University of Wellington
Ulf T. Mattsson
CTO of Protegrity
Dmitry Nefedov
Chief Software Developer at ElcomSoft
Christian Seifert
PhD student at Victoria University of Wellington
Shreeraj Shah
Founder of Net-Square
Dr. Ian Welch
Teaches and researches at Victoria University of Wellington

Virtual trust

PDF download
Read issue 9 now
Share

Table of contents

  • Effectiveness of security by admonition: a case study of security warnings in a web browser setting
  • Interview with Kurt Sauer, CSO at Skype
  • Web 2.0 defense with AJAX fingerprinting and filtering
  • Hack In The Box Security Conference 2006
  • Where iSCSI fits in enterprise storage networking
  • Recovering user passwords from cached domain records
  • Do portable storage solutions compromise business security?
  • Enterprise data security – a case study
  • Creating business through virtual trust: how to gain and sustain a competitive advantage using information security

(IN)SECURE Magazine archive More →

ISSUE 72(July, 2022 )
  • 7 threat detection challenges CISOs face and what they can do about it
  • How to set up a powerful insider threat program
  • An offensive mindset is crucial for effective cyber defense
go to issue
ISSUE 71.5(June, 2022 )

Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and more.

go to issue
ISSUE 71(March, 2022 )
  • Why security strategies need a new perspective
  • The evolution of security analytics
  • Open-source code: How to stay secure while moving fast
go to issue