ISSUE 9 (December 2006)
Virtual trust
Issue 9 Contributors
Kenneth F. Belva
CISSP, CEH, CISM at Credit Industriel et Commercial
Todd Bundy
Director of Business Development and Alliances at ADVA Optical Networking
Rob Faber
Infrastructure architect and senior engineer
Dr. Peter Komisarczuk
Teaches and researches at Victoria University of Wellington
Ulf T. Mattsson
CTO of Protegrity
Dmitry Nefedov
Chief Software Developer at ElcomSoft
Christian Seifert
PhD student at Victoria University of Wellington
Shreeraj Shah
Founder of Net-Square
Dr. Ian Welch
Teaches and researches at Victoria University of Wellington

Virtual trust

PDF download
Read issue 9 now

Table of contents

  • Effectiveness of security by admonition: a case study of security warnings in a web browser setting
  • Interview with Kurt Sauer, CSO at Skype
  • Web 2.0 defense with AJAX fingerprinting and filtering
  • Hack In The Box Security Conference 2006
  • Where iSCSI fits in enterprise storage networking
  • Recovering user passwords from cached domain records
  • Do portable storage solutions compromise business security?
  • Enterprise data security – a case study
  • Creating business through virtual trust: how to gain and sustain a competitive advantage using information security

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue