<?xml version="1.0" standalone="yes"?>  
<rss version="2.0" xmlns:creativeCommons="http://backend.userland.com/creativeCommonsRssModule" xmlns:dc="http://purl.org/dc/elements/1.1/">

  <channel>

  <title>(IN)SECURE Magazine Notifications RSS</title> 

  <link>http://www.insecuremag.com</link> 

  <description>Notifications of new (IN)SECURE Magazine issues.</description> 

  <creativeCommons:license>http://creativecommons.org/licenses/by-sa/1.0/</creativeCommons:license> 

  <language>en-us</language> 

<lastBuildDate>Mon, 18 Jul 2022 07:00:06 GMT</lastBuildDate>


<item><title>(IN)SECURE Magazine Issue 72</title>   <link>https://www.helpnetsecurity.com/insecuremag/issue-72-july-2022/</link><description><![CDATA[Articles in this issue include: <br /><br />

 - Review: Hornetsecurity 365 Total Protection Enterprise Backup<br />
 - 7 threat detection challenges CISOs face and what they can do about it<br />
 - How to set up a powerful insider threat program<br />
 - Top 5 security analytics to measure<br />
 - How to avoid security blind spots when logging and monitoring<br />
 - Photo gallery: Cyber Week 2022<br />
 - Review: Enzoic for Active Directory<br />
 - An offensive mindset is crucial for effective cyber defense<br />
 - The SaaS-to-SaaS supply chain is a wild, wild mess<br />
 - How the blurring of the supply chain opens your doors to attackers—and how you can close them<br />


]]></description></item>

<item><title>(IN)SECURE Magazine Issue 70</title>   <link>https://www.helpnetsecurity.com/insecuremag/issue-70-november-2021/</link><description><![CDATA[Articles in this issue include: <br /><br />

- How to develop a skilled cybersecurity team<br />
 - Securing your WordPress website against ransomware attacks<br />
 - The warning signs of burnout and how to deal with it<br />
 - How to prevent corporate credentials ending up on the dark web<br />
 - Risky business: Steps for building an effective GRC program<br />
 - ​A ​remedial approach to destructive IoT hacks<br />
 - Zero trust: Bringing security up to speed for the “work-from-anywhere” age<br />
 - What is the HIPAA Security Rule? Three safeguards to have in place<br />
 - Why automated pentesting won’t fix the cybersecurity skills gap<br />
 - What are the post-pandemic security concerns for IT pros and their organizations<br />
 - Vulnerability management is facing three core problems: Here’s how to solve them<br />
 - How building a world class SOC can alleviate security team burnout<br />
 - Top tips for preventing SQL injection attacks<br />

]]></description></item>

<item><title>(IN)SECURE Magazine Issue 69</title>   <link>https://www.helpnetsecurity.com/insecuremag/issue-69-july-2021/</link><description><![CDATA[Articles in this issue include: <br /><br />

 - Why threat hunting is obsolete without context<br />
 - Review: Group-IB Threat Hunting Framework<br />
 - Navigating the waters of maritime cybersecurity<br />
 - Defending against Windows RDP attacks<br />
 - The evolution of the modern CISO<br />
 - Understanding the cloud shared responsibility model<br />
 - Why is patch management so difficult to master?<br />
 - Preventing security issues from destroying the promise of IoT<br />
 - Reformulating the cyber skills shortage<br />
 - Cybersecurity industry analysis: Another recurring vulnerability we must correct<br />
 - For CISOs and artificial intelligence to evolve, trust is a must<br />
 - Quantum computing is imminent, and enterprises need crypto agility now<br />
 - When the adversarial view of the attack surface is missing, digital transformation becomes riskier<br />

]]></description></item>

<item><title>(IN)SECURE Magazine Issue 68</title>   <link>https://www.helpnetsecurity.com/insecuremag/issue-68-march-2021/</link><description><![CDATA[Articles in this issue include: <br /><br />

 - Physical cyber threats: What do criminals leave when they break in? <br />
 - Review: Group-IB Fraud Hunting Platform<br />
 - The transportation sector needs a standards-driven, industry-wide approach to cybersecurity<br />
 - Tips for boosting the “Sec” part of DevSecOps<br />
 - When it comes to vulnerability triage, ditch CVSS and prioritize exploitability<br />
 - Homomorphic encryption: Myths and misconceptions<br />
 - How to motivate employees to take cybersecurity seriously<br />
 - Enable secure remote workspaces without trashing your entire IT infrastructure<br />
 - Protecting productivity within the disappearing perimeter<br />
 - Closing the data divide: How to create harmony among data scientists and privacy advocates<br />
 - Database encryption: Protecting the crown jewels<br />
 - Can we put a stop to cyber harassment?<br />
 - Preparing for the CMMC onslaught<br />
 - For SOC teams, the analytics and automation hype is real<br />
 - Three ways MITRE ATT&CK can improve your organizational security<br />

]]></description></item>

<item><title>(IN)SECURE Magazine Issue 66</title>   <link>https://www.helpnetsecurity.com/insecuremag/issue-66-june-2020/</link><description><![CDATA[Articles in this issue include: <br /><br />

 - Let us be realistic about our expectations of AI<br />
 - Full-time bug hunting: Pros and cons of an emerging career<br />
 - Crowdsourced pentesting is not without its issues<br />
 - Changing the mindset of the CISO: From enforcer to enabler<br />
 - Review: Specops Key Recovery<br />
 - Is the future of information security and tech conferences virtual?<br />
 - Cybersecurity is a board level issue: 3 CISOs tell why<br />
 - The top four Office 365 security pain points<br />
 - On my mind: Transitioning to third party cloud services<br />

]]></description></item>

<item><title>(IN)SECURE Magazine Issue 65</title>   <link>https://www.helpnetsecurity.com/insecuremag/issue-65-february-2020/</link><description><![CDATA[Articles in this issue include: <br /><br />

 - A case for establishing a common weakness enumeration for hardware security<br />
 - Things to keep in mind when raising capital for your cybersecurity venture<br />
 - Burner phones are an eavesdropping risk for international travelers<br />
 - Hardware hacks: The next generation of cybercrime<br />
 - California’s IoT cybersecurity bill: What it gets right and wrong<br />
 - 7 signs your cybersecurity is doomed to fail in 2020<br />
 - How to test employee cyber competence through pentesting<br />
 - Smart cities are on the rise: What are the dangers?<br />
 - Modern security product certification best practices<br />
 - Why outsourcing your DPO is an effective insurance policy<br />

]]></description></item>


<item><title>(IN)SECURE Magazine Issue 64</title>   <link>https://www.helpnetsecurity.com/insecuremag/issue-64-december-2019/</link><description><![CDATA[Articles in this issue include: <br /><br />

 - Could audio warnings augment your ability to fight off cyberattacks?<br />
 - Your supplier’s BEC problem is your BEC problem<br />
 - Product Showcase: SpyCloud Active Directory Guardian<br />
 - Unmask cybercriminals through identity attribution<br />
 - Phishing attacks are a complex problem that requires layered solutions<br />
 - Winning the security fight: Tips for organizations and CISOs<br />
 - Want to build a SOC? Here is what you need to know beforehand<br />
 - Product showcase: Alsid for AD<br />
 - When is the right time to red team?<br />
 - IoT is an ecosystem, as secure as its weakest link
<br />
]]></description></item>


<item><title>(IN)SECURE Magazine Issue 63</title>   <link>https://www.helpnetsecurity.com/insecuremag/issue-63-september-2019/</link><description><![CDATA[Articles in this issue include: <br /><br />

 - Identifying evasive threats hiding inside the network<br />
 - Inside the NIST team working to make cybersecurity more user-friendly<br />
 - Report: Black Hat USA 2019<br />
 - Healthcare blind spot: Unmanaged IoT and medical devices<br />
 - What the education industry must do to protect itself from cyber attacks<br />
 - Solving security problems: Security advice for those with limited resources<br />
 - Review: Specops uReset<br />
 - True passwordless authentication is still quite a while away<br />
 - Six criteria for choosing the right security orchestration vendor<br />
 - Ensuring supply chain security: 5 IT strategies for choosing vendors wisely<br />
 - Have you thought about the often-overlooked mobile app threat?
<br />
]]></description></item>

<item><title>(IN)SECURE Magazine Issue 62</title>   <link>http://helpnet.pro/qqyc</link><description><![CDATA[Articles in this issue include: <br /><br />

 - What's your company's risk exposure?<br />
 - The modern threat landscape and expanding CISO challenges<br />
 - Product showcase: Veriato Cerebral user & entity behavior analytics software<br />
 - Building a modern data registry: Go beyond data classification<br />
 - What happened to trust and transparency in cybersecurity?<br />
 - Prioritising risks in a climate of geopolitical threats<br />
 - An intelligence-driven approach to cyber threats<br />
 - Is curiosity killing patient privacy? Combatting insider threats in the healthcare contact center<br />
 - Protecting applications against DFA attacks<br />
 - The SEC demands better disclosure for cybersecurity incidents and threats<br />
]]></description></item>


<item><title>(IN)SECURE Magazine Issue 60</title>   <link>http://helpnet.pro/s36s</link><description><![CDATA[Articles in this issue include: <br /><br />

 - How to make the CFO your best cybersecurity friend<br />
 - Review: Specops Password Policy<br />
 - Break out of malware myopia by focusing on the fundamentals<br />
 - Securing our future in the age of IoT <br />
 - Blind spots and how to see them: Observability in a serverless environment<br />
 - There are no real shortcuts to most security problems<br />
 - Bridging the priority gap between IT and security in DevOps<br />
 - Are you ready? A good incident response plan can protect your organization<br />
 - Privacy laws do not understand human error:  Securing unstructured data in the age of data privacy regulations<br />
 - The future of OT security in critical infrastructure<br />
]]></description></item>


<item><title>(IN)SECURE Magazine Issue 59</title>   <link>http://helpnet.pro/96kt</link><description><![CDATA[Articles in this issue include: <br /><br />

 - The importance of career pathing in the cybersecurity industryy<br />
 - Securing healthcare organizations: The challenges CISOs facey<br />
 - Fingerprinting HTTP anomalies to dissect malicious operationsy<br />
 - How to keep cryptominers from opening up your IT container boxesy<br />
 - Report: Black Hat USA 2018y<br />
 - Vulnerability research and responsible disclosure: Advice from an industry veterany<br />
 - Managing migration mayhem: A roadmap for successy<br />
 - For the love of a good IT book: The No Starch Press storyy<br />
 - Overcoming the threat of ransomware with zero-day recoveryy<br />
 - Infosec and the future: Dr. Giovanni Vigna on lessons learned over 25 yearsy<br />
]]></description></item>


<item><title>(IN)SECURE Magazine Issue 57</title>   <link>https://www.helpnetsecurity.com/insecuremag/issue-57-march-2018/</link><description><![CDATA[Articles in this issue include: <br /><br />

 - Achieving zero false positives with intelligent deception<br />
 - Expected changes in IT/OT convergence and industrial security<br />
 - Testing machine learning products requires a new approach<br />
 - Why do we need a risk-based approach to authentication?<br />
 - Healthcare organizations and the cloud: Benefits, risks, and security best practices<br />
 - A deep dive into blockchain and Bitcoin<br />
]]></description></item>

<item><title>(IN)SECURE Magazine Issue 56</title>   <link>https://www.helpnetsecurity.com/insecuremag-archive/</link><description><![CDATA[Articles in this issue include: <br /><br />

 - How consumers, enterprises and insurance providers tackle cyber risk<br />
 - Industrial cyber insurance comes of age<br />
 - The modern challenges of cyber liability<br />
 - Rethinking corporate risk practices in the cyber age<br />
 - Cyber insurance's inevitable evolution into risk management services<br />
 - As cyber risks enter the top three global business risks, the insurance industry  - responds<br />
 - Cut the FUD: Why Fear, Uncertainty and Doubt is harming the security industry<br />
 - Using a robust platform for cyber threat analysis training<br />
 - Sophisticated threats? It's usually the basic ones that get you<br />
]]></description></item>

<item><title>(IN)SECURE Magazine Issue 55</title>   <link>https://www.helpnetsecurity.com/insecuremag-archive/</link><description><![CDATA[Articles in this issue include: <br /><br />

 - Building a successful information security monitoring program in an age of overwhelming data<br />
 - AI for cybersecurity: Promises and limitations<br />
 - Report: Black Hat USA 2017<br />
 - Designing security policies to fit your organization’s needs<br />
 - KPN CISO paints a greater security picture<br />
 - Has healthcare misdiagnosed the cybersecurity problem?<br />
 - Review: Acunetix 11<br />
 - Why end-to-end encryption is about more than just privacy<br />
 - Journey to the cloud: Automated, continuous, visible<br />
 - How to catch a phish<br />
]]></description></item>

<item><title>(IN)SECURE Magazine Issue 54</title>   <link>https://www.helpnetsecurity.com/insecuremag/issue-54-june-2017/</link><description><![CDATA[Articles in this issue include: <br /><br />

 - The death of passwords: Cybersecurity fake news?<br />
 - Breaking the secure enough mindset<br />
 - Cyber hygiene: The more you know<br />
 - What's an IT architect, and could you become one?<br />
 - Report: Infosecurity Europe 2017<br />
 - Is your dragline dragging in security threats?<br />
 - Businesses finally realize that cyber defenses must evolve<br />
 - A simplified guide to PCI DSS compliance<br />
]]></description></item>


<item><title>(IN)SECURE Magazine Issue 53</title>   <link>https://www.helpnetsecurity.com/insecuremag/issue-53-march-2017/</link><description><![CDATA[Articles in this issue include: <br /><br />

 - How to leverage the benefits of open source software in a secure way<br />
 - Antivirus 2017: Security with a hint of surveillance<br />
 - Evolving PKI for the Internet of Things<br />
 - 7 real-world steps to security nirvana<br />
 - The HTTPS interception dilemma: Pros and cons<br />
 - Deception security doesnt have to be onerous or expensive<br />
 - Report: BSides Ljubljana 0x7E1<br />
 - 5 spring cleaning tips for your Identity and Access Management program<br />
]]></description></item>

<item><title>(IN)SECURE Magazine Issue 52</title>   <link>https://www.helpnetsecurity.com/insecuremag/issue-52-december-2016/</link><description><![CDATA[Articles in this issue include: <br /><br />

 - SCADA cybersecurity: A long history of errors <br />
 - Healthcare security: Combating advanced threats <br />
 - Do nott let your security education and awareness to take the back seat <br />
 - The devil is in the details: What your metadata says about you <br />
 - ICS cybersecurity: Futurism vs the here and now <br />
 - Will cybersecurity change with a change in administration? <br />
 - Review: IS Decisions UserLock <br />
 - "Build security in from the start" for app developers <br />
 - Executive hot seat: Lior Frenkel, CEO at Waterfall Security Solutions <br />
 - Narrowing the attack surface: A strategic approach to security <br />
 - Black Friday sales and enterprise data: Compromised information on the dark web
 - Commonly overlooked threat vectors <br />
 - Kaspersky Lab sets up a global ICS-CERT <br />
 - A checklist for people who understand cyber security <br />
]]></description></item>

<item><title>(IN)SECURE Magazine Issue 50</title>   <link>https://www.helpnetsecurity.com/insecuremag/issue-50-june-2016/</link><description><![CDATA[Articles in this issue include: <br /><br />

 - Securing the future: Best practices for keeping corporate information safe during an M&A<br />
 - Executive hot seat: Ron Green, Executive VP, CISO at MasterCard<br />
 - 7 tips to get the absolute best price from security vendors<br />
 - How CISOs can bridge the gap between their organizations’ IT and security needs<br />
 - Risk management: Risks are lurking everywhere<br />
 - Report: Infosecurity 2016<br />
 - Internet of Fail: How modern devices expose our lives<br />
 - Executive hot seat: Sumedh Thakar, Chief Product Officer at Qualys<br />
 - Security: Missing from DevOps thinking?<br />
 - The life of a social engineer: Hacking the human<br />
 - What 17 years as an infosec trainer have taught me<br />
]]></description></item>


<item><title>(IN)SECURE Magazine Issue 49</title>   <link>https://www.helpnetsecurity.com/insecuremag/issue-49-february-2016/</link><description><![CDATA[Articles in this issue include: <br /><br />

 - Privacy by design: What it is and where to build it<br />
 - Harnessing artificial intelligence to build an army of virtual analysts<br />
 - Building and implementing an incident response program from scratch<br />
 - Take it to the boardroom: Elevating the cybersecurity discussion<br />
 - Cyber security control maturity: What it is, and why you should care<br />
 - Have I been hacked? The indicators that suggest you have<br />
 - Demanding accountability: The need for cyber liability<br />
 - Adding the cloud to your rainy day plan<br />
 - The slings and arrows of encryption technology<br />
]]></description></item>

<item><title>(IN)SECURE Magazine Issue 48</title>   <link>http://www.net-security.org/insecuremag.php</link><description><![CDATA[Articles in this issue include: <br /><br />

- Ivan Ristic and SSL Labs: How one man changed the way we understand SSL<br />
- Review: Change and configuration auditing with Netwrix Auditor 7.0<br />
- How things change: Secure remote access to industrial control systems<br />
- Developing and implementing an information security program<br />
- Applying machine learning techniques on contextual data for threat detection<br />
- Why governments need to take the lead in cybersecurity<br />
- How talking to recognition technologies will change us<br />
- Why I recommend Chrome to family<br />
- Inside the largely unexplored world of mainframe security<br />
- The Lord of the Hacktivist Rings<br />
- Minutes matter: Why detection, visibility and response are critical in the post-prevention era<br />
- Web application fingerprinting with Blind Elephant<br />
]]></description></item>



<item><title>(IN)SECURE Magazine Issue 47</title>   <link>http://www.net-security.org/insecuremag.php</link><description><![CDATA[Articles in this issue include: <br /><br />

- Redefining security visualization with Hollywood UI design<br />
- Best practices for ensuring compliance in the age of cloud computing<br />
- The evolution of DDoS and how ISPs can respond<br />
- NowSecure Lab cloud: Mobile app assessment environment<br />
- Why vulnerability disclosure shouldn’t be a marketing tool<br />
- Report: Black Hat USA 2015<br />
- We don't know what we don't know<br />
- Outdated protocols put IoT revolution at risk<br />
- The challenges of implementing tokenization in a medium-sized enterprise<br />
- Automated threat management: No signature required<br />
- Re-thinking security to detect active data breaches<br />
- How to prevent insider threats in your organization<br />
- ISO/IEC 27001 scoping and beyond<br />
- Combatting human error in cybersecurity<br />
- Threat intelligence matters to everyone<br />
]]></description></item>



<item><title>(IN)SECURE Magazine Issue 46</title>   <link>http://www.net-security.org/insecuremag.php</link><description><![CDATA[Articles in this issue include: <br /><br />

 - The Art of War applied to web application security<br />
 - Signature antivirus' dirty little secret<br />
 - Review: Tresorit for Business<br />
 - Making IoT security a reality<br />
 - Report: Hack In The Box<br />
 - Avoiding an IT disaster: Smart security for smart meters<br />
 - The standardization of tokenization and moving beyond PCI<br />
 - 10 practical security tips for DevOps<br />
 - Identifying the insider threat<br />
 - EMV’s impact on increasing card-not-present fraud: Now what?<br />
 - Identity crisis? Honoring the IAM legacy while taking action and embracing the future<br />
 - Report: Infosecurity Europe 2015<br />
 - IoT, interoperability, and identity<br />
]]></description></item>




<item><title>(IN)SECURE Magazine Issue 45</title>   <link>http://www.net-security.org/insecuremag.php</link><description><![CDATA[Articles in this issue include: <br /><br />

- How do we ensure the Security of Things in light of the Internet of Threats?<br />
- Security and compliance: A balancing act of inequalities<br />
- Which kind of security professional are you?<br />
- The derived credential: delivering digital security to a mobile world<br />
- Declaring personal data bankruptcy and the cost of privacy<br />
- Total threat protection: Myth and reality<br />
- DevOps vs security: Can Docker make a difference?<br />
- Best practices for securing PoS systems<br />
- Challenges faced by global network professionals<br />
- Who are the role models in cyberspace?<br />
- Tackling today’s authentication complexities<br />
]]></description></item>





<item><title>(IN)SECURE Magazine Issue 43</title>   <link>http://www.net-security.org/insecuremag.php</link><description><![CDATA[Articles in this issue include: <br /><br />

- What is the value of professional certification?<br /> 
- How to tell if your security system has been fingerprinted by evasive malware<br /> 
- Mobile hackers look to the network<br /> 
- Why every security-conscious organization needs a honeypot<br /> 
- Securing the U.S. electrical grid<br /> 
- Using Hollywood to improve your security program<br /> 
- How a large ISP fights DDoS attacks with a custom solution<br /> 
- Black Hat USA 2014<br /> 
- The synergy of hackers and tools at the Black Hat Arsenal<br /> 
- Web application security today<br /> 
- Big Data analytics to the rescue<br /> 
- Why now is the time for enterprises to implement context-based authentication<br /> 
- HoneyMalt: Mapping honeypots using Maltego<br /> 
- Failure is an option<br /> 
- Cloud security: Do you know where your data is?<br /> 
]]></description></item>




<item><title>(IN)SECURE Magazine Issue 42</title>   <link>http://www.net-security.org/insecuremag.php</link><description><![CDATA[Articles in this issue include: <br /><br />

- Six infosec tips I learned from Game of Thrones<br /> 
- Dissecting the newly-discovered desire for control and privacy<br /> 
- Incident response and failure of the "Just Fix It" attitude<br /> 
- How to learn information security<br /> 
- Who are you? The impact of security breaches on authentication<br /> 
- Thecus N5550 NAS Server inside and out<br /> 
- Report: Hack In The Box Amsterdam 2014<br /> 
- Ensuring the integrity of Rostelecom’s Wi-Fi network<br /> 
- What inspired you to start hacking?<br /> 
- Beyond Heartbleed: Closing SSL implementation gaps within our own networks<br /> 
- Ironclad incident response<br /> 
- Hands-on fun at HacKid 2014<br /> 
- Are you ready for the day when prevention fails?<br /> 
- Why privacy engineering is needed<br /> 
]]></description></item>





<item><title>(IN)SECURE Magazine special issue: Infosecurity Europe 2014</title>   <link>http://www.net-security.org/insecuremag.php</link><description><![CDATA[At this year’s Infosecurity Europe conference and exhibition, senior figures from both government and industry have called for greater collaboration on how security intelligence is shared, in order to protect against cyber-attacks and ensure that security insight spreads beyond IT teams to affect boardroom decisions.
<br /><br />
The show, which attracted more than 15,000 unique industry professionals from 73 countries across the three days, had a massive show floor featuring 345 exhibitors from 24 countries. Presented in this issue are some of the most interesting news and companies we've seen at the show.

]]></description></item>




<item><title>(IN)SECURE Magazine special issue: RSA Conference 2014</title>   <link>http://www.net-security.org/insecuremag.php</link><description><![CDATA[To say that this year's RSA Conference was a large event is an understatement. A record number of more than 28,500 attendees experienced more than 410 sessions, keynotes, peer-to-peer sessions, track sessions, tutorials and seminars, which featured 604 speakers.<br /><br />

On top of that, spread over two expo floors, a total of 400 companies showcased the tools and technologies that will protect personal and professional assets now and in the future. <br /><br />

Featured in this magazine are the most important news and companies from the conference, which allows you to get an in-depth look at the highlights of the event.

]]></description></item>



<item><title>(IN)SECURE Magazine Issue 41</title>   <link>http://www.net-security.org/insecuremag.php</link><description><![CDATA[Articles in this issue include: <br /><br />

- Cloud insecurity? Time to bust the myth<br />
- Executive hot seat: Cloud Security Alliance CEO<br />
- Security uncertainty in the cloud: Problems and potential solutions<br />
- Share with the world: Who reads my data in the cloud?<br />
- Executive hot seat: Intrinsic-ID CEO<br />
- Privacy in the cloud: The power of encryption<br />
- How to recover deleted or corrupted digital currency<br />
- Leveraging Big Data for security operations<br />
- The past, present, and future of Big Data security<br />
- Information stewardship: Avoiding data breaches and managing Big Data<br /> 
- Generating value from Big Data analytics<br />
- Too big to fail: The Big Data dilemma<br />
]]></description></item>





<item><title>(IN)SECURE Magazine Issue 40</title>   <link>http://www.net-security.org/insecuremag.php</link><description><![CDATA[Articles in this issue include: <br /><br />

- How malware became the cyber threat it is today<br />
- Testing anti-malware products<br />
- Shoulder surfing via audio frequencies for XBox Live passwords<br />
- How to write Yara rules to detect malware<br />
- Report: HITBSecConf2013 Malaysia<br />
- Using Tshark for malware detection<br />
- 5 questions for the head of a malware research team<br />
- Beyond apps, beyond Android: 2013 mobile threat trends<br />
- Malware analysis on a shoestring budget<br />
- Report: Virus Bulletin 2013<br />
- Digital ship pirates: Researchers crack vessel tracking system<br />
- Exploring the challenges of malware analysis<br />
- Evading file-based sandboxes<br />
- Report: RSA Conference Europe 2013<br />
- Data security to protect PCI data flow<br />
]]></description></item>



<item><title>(IN)SECURE Magazine Issue 39</title>   <link>http://www.net-security.org/insecuremag.php</link><description><![CDATA[Articles in this issue include: <br /><br />

- Dear CSO, do you know how to build security culture?<br />
- How to secure a company’s Chinese development center?<br />
- Stephen Pao, GM, Security Business at Barracuda Networks, on web application security<br />
- The state of web application security in numbers<br />
- Web application exploitation with broken authentication and path traversal<br />
- Joel Smith, AppRiver CTO, on web threats<br />
- With big data comes big responsibility: The (in)security of OLAP systems<br />
- There are no winners in the blame game<br />
- Digital graphology: It's all in the signature<br />
- Security from within: Proactive steps towards protecting corporate assets from attack<br />
- The five biggest reasons your IT staff is losing sleep <br />
- How to manage your passwords with KeePass<br /> 
]]></description></item>


<item><title>(IN)SECURE Magazine Issue 38</title>   <link>http://www.net-security.org/insecuremag.php</link><description><![CDATA[Articles in this issue include: <br /><br />

- Becoming a malware analyst<br />
- Review: Nipper Studio<br />
- Five questions for Microsoft's Chief Privacy Officer<br />
- Application security testing for AJAX and JSON<br />
- Penetrating and achieving persistence in highly secured networks<br />
- Report: RSA Conference 2013<br />
- Social engineering: An underestimated danger <br />
- Review: Hacking Web Apps<br />
- Improving information security with one simple question<br />
- Security needs to be handled at the top<br />
- 8 key data privacy considerations when moving servers to the public cloud<br />
- A closer look to HITBSecConf 2013 Amsterdam<br />

]]></description></item>


<item><title>(IN)SECURE Magazine Issue 37</title>   <link>http://www.net-security.org/insecuremag.php</link><description><![CDATA[Articles in this issue include: <br /><br />

- Becoming a malware analyst<br />
- Review: Nipper Studio<br />
- Five questions for Microsoft's Chief Privacy Officer<br />
- Application security testing for AJAX and JSON<br />
- Penetrating and achieving persistence in highly secured networks<br />
- Report: RSA Conference 2013<br />
- Social engineering: An underestimated danger <br />
- Review: Hacking Web Apps<br />
- Improving information security with one simple question<br />
- Security needs to be handled at the top<br />
- 8 key data privacy considerations when moving servers to the public cloud<br />

]]></description></item>


<item><title>(IN)SECURE Magazine Issue 36</title>   <link>http://www.net-security.org/insecuremag.php</link><description><![CDATA[Articles in this issue include: <br /><br />

- What makes security awareness training successful?<br />
- Review - Incapsula: Enterprise-grade website security<br />
- Five questions for Microsoft's Worldwide Chief Security Advisor<br />
- Computer forensic examiners are from Mars, attorneys are from Venus<br />
- In the field: RSA Conference 2012 Europe<br />
- A mobile environment security assessment<br />
- Hack In The Box CEO on the information security landscape<br />
- In the field: IRISSCERT Cybercrime Conference 2012<br />
- Comply or die: The importance of a business-centric approach to compliance<br />
- Hackers can get in when systems are off: The risks of lights out management<br />
- It's just the guest wireless network…right?<br />

]]></description></item>



<item><title>(IN)SECURE Magazine Issue 35</title>   <link>http://www.net-security.org/insecuremag.php</link><description><![CDATA[Articles in this issue include: <br /><br />

- Administrative scripting with Nmap<br />
- Information security in Europe with ENISA Executive Director Prof.
Udo Helmbrecht<br />
- Unintended, malicious and evil applications of augmented reality<br />
- The enemy at the gate<br />
- Top five hurdles to security and compliance in industrial control systems<br />
- How to monitor the blind spots in your IT system: Logging versus auditing<br />
- DBI aid reverse engineering: Pinpointing interesting code<br />
- The importance of data normalization in IPS<br />

]]></description></item>


<item><title>(IN)SECURE Magazine Issue 34</title>   <link>http://www.net-security.org/insecuremag.php</link><description><![CDATA[Articles in this issue include: <br /><br />

- Fitness as a model for security<br />
- Security and migrating to the cloud: Is it all doom and gloom?<br />
- Solid state drives: Forensic preservation issues<br />
- Introduction to Android malware analysis<br />
- Hack in The Box Conference 2012 Amsterdam<br />
- ISO 27001 standard: Breaking the documentation myth<br />
- Preparing a breach response plan<br />
- Security beyond the operating system: Into the cloud and beyond<br />
- Amphion Forum 2012 Munich<br />
- The challenges of data recovery from modern storage systems<br />
- Two-factor authentication for the cloud: Does it have to be hard?<br />

]]></description></item>


<item><title>(IN)SECURE Magazine special issue: RSA Conference 2012</title>   <link>http://www.net-security.org/insecuremag.php</link><description><![CDATA[Articles in this issue include: <br /><br />

- News from RSA Conference 2012<br />
- Information security within emerging markets<br />
- Evolving security trends in smartphone and mobile computing<br />
- The biggest problem in application security today<br />
- RSA Conference 2012 award winners<br />
- Innovation Sandbox<br />

]]></description></item>



<item><title>(IN)SECURE Magazine Issue 33</title>   <link>http://www.net-security.org/insecuremag.php</link><description><![CDATA[Articles in this issue include: <br /><br />

- Securing Android: Think outside the box<br />
- Interview with Joe Sullivan, CSO at Facebook<br />
- White hat shellcode: Not for exploits<br />
- Using mobile device management for risk mitigation in a heterogeneous environment<br />
- Metasploit: The future of penetration testing with HD Moore<br />
- Using and extending the Vega open source web security platform<br />
- Next-generation policies: Managing the human factor in security<br />

]]></description></item>



<item><title>(IN)SECURE Magazine Issue 32</title>   <link>http://www.net-security.org/insecuremag.php</link><description><![CDATA[Articles in this issue include: <br /><br />

- 7 questions you always wanted to ask a professional vulnerability researcher<br />
- Insights on drive-by browser history stealing<br />
- Review: Kingston DataTraveler 6000<br />
- RSA Conference Europe 2011<br />
- PacketFence: Because NAC doesn't have to be hard!<br />
- Information security and the threat landscape with Raj Samani<br />
- Security is a dirty word<br />
- Smartphone apps are not that smart: Insecure development practices<br />
- Virus Bulletin 2011<br />
- Infosec professionals: Accomplishing your day job without breaking the law<br />
- WPScan: WordPress Security Scanner<br />
- Securing the enterprise: Is your IT department under siege?<br />

]]></description></item>



<item><title>(IN)SECURE Magazine Issue 31</title>   <link>http://www.net-security.org/insecuremag.php</link><description><![CDATA[Articles in this issue include: <br /><br />

- The changing face of hacking<br />
- Review: [hiddn] Crypto Adapter<br />
- A tech theory coming of age<br />
- SecurityByte 2011: Cyber conflicts, cloud computing and printer hacking<br />
- The need for foundational controls in cloud computing<br />
- A new approach to data centric security<br />
- The future of identity verification through keystroke dynamics<br />
- Visiting Bitdefender's headquarters<br />
- Rebuilding walls in the clouds<br />
- Testing Domino applications<br />
- Report: Black Hat 2011 USA<br />
- Safeguarding user access in the cloud with identity governance<br />

]]></description></item>



<item><title>(IN)SECURE Magazine Issue 30</title>   <link>http://www.net-security.org/insecuremag.php</link><description><![CDATA[Articles in this issue include: <br /><br />

- Microsoft's Exploit Mitigation Experience Toolkit<br />
- Transaction monitoring as an issuer fraud risk management technique in the banking card payment system<br />
- IPv6: Saviour and threat<br />
- The hard truth about mobile application security: Separating hype from reality<br />
- Don't fear the auditor<br />
- Book review: Kingpin<br />
- Secure mobile platforms: CISOs faced with new strategies<br />
- Security needs to be unified, simplified and proactive<br />
- Whose computer is it anyway?<br />
- 10 golden rules of information security<br />
- The token is dead<br />
- Book review: IPv6 for Enterprise Networks<br />
- Cyber security revisited: Change from the ground up?<br />

]]></description></item>

<item><title>(IN)SECURE Magazine Issue 29</title>   <link>http://www.net-security.org/insecuremag.php</link><description><![CDATA[Articles in this issue include: <br /><br />

- Virtual machines: Added planning to the forensic acquisition process<br />
- Review: iStorage diskGenie<br />
- Managers are from Mars, information security professionals are from Venus<br />
- PacketWars: A cyber security sport for a cyber age<br />
- Q&A: Graham Cluley on Facebook security and privacy<br />
- Financial Trojans: Following the money<br />
- Mobile encryption: The new frontier<br />
- Report: RSA Conference 2011<br />
- Combating public sector fraud with better information analysis<br />
- Q&A: Stefan Frei on security research and vulnerability management<br />
- The expanding role of digital certificates… in more places than you think<br />
- 5 questions to ask when reevaluating your data security solution<br />
- How to achieve strong authentication on the Web while balancing security, usability and cost<br />
]]></description></item>


<item><title>(IN)SECURE Magazine Issue 28</title>   <link>http://www.net-security.org/insecuremag.php</link><description><![CDATA[Articles in this issue include: <br /><br />

- Database protocol exploits explained<br />
- Review: MXI M700 Bio<br />
- Measuring web application security coverage<br />
- Inside backup and storage: The expert's view<br />
- Combating the changing nature of online fraud<br />
- Book review: CISSP Study Guide<br />
- Successful data security programs encompass processes, people, technology<br />
- Sangria, tapas and hackers: SOURCE Barcelona 2010<br />
- What CSOs can learn from college basketball<br />
- Network troubleshooting 101<br />
- America’s cyber cold war<br />
- RSA Conference Europe 2010<br />
- Book review: Dissecting the Hack: The F0rb1dd3n Network (Revised Edition)<br />
- Bootkits – a new stage of development<br />
]]></description></item>


<item><title>(IN)SECURE Magazine Issue 27</title>   <link>http://www.net-security.org/insecuremag.php</link><description><![CDATA[Articles in this issue include: <br /><br />

- Review: BlockMaster SafeStick secure USB flash drive<br />
- The devil is in the details: Securing the enterprise against the cloud<br />
- Cybercrime may be on the rise, but authentication evolves to defeat it<br />
- Learning from bruteforcers<br />
- PCI DSS v1.3: Vital to the emerging demand for virtualization and cloud security<br />
- Security testing - the key to software quality<br />
- A brief history of security and the mobile enterprise<br />
- Payment card security: Risk and control assessments<br />
- Security as a process: Does your security team fuzz?<br />
- Book review: Designing Network Security, 2nd Edition<br />
- Intelligent security: Countering sophisticated fraud<br />
]]></description></item>



<item><title>(IN)SECURE Magazine Issue 26</title>   <link>http://www.net-security.org/insecuremag.php</link><description><![CDATA[Articles in this issue include: <br /><br />

- PCI: Security's lowest common denominator<br />
- Analyzing Flash-based RIA components and discovering vulnerabilities<br />
- Logs: Can we finally tame the beast?<br />
- Launch arbitrary code from Excel in a restricted environment<br />
- Placing the burden on the bot<br />
- Data breach risks and privacy compliance: The expanding role of the IT security professional<br />
- Authenticating Linux users against Microsoft Active Directory<br />
- Hacking under the radar<br />
- Photos: Infosecurity Europe 2010<br />
- Securing the office in your pocket<br />
- iPhone backup, encryption and forensics<br />
- The growing problem of cyber bullying<br />
- Secure collaboration: Managing the inside threat posed by trusted outsiders<br />
- SMS spamming<br />
- A new scalable approach to data tokenization<br />
]]></description></item>


<item><title>(IN)SECURE Magazine Issue 25</title>   <link>http://www.net-security.org/insecuremag.php</link><description><![CDATA[Articles in this issue include: <br /><br />

- The changing face of penetration testing: Evolve or die!<br />
- Review: SmartSwipe<br />
- Unusual SQL injection vulnerabilities and how to exploit them<br />
- Take note of new data notification rules<br />
- RSA Conference 2010 coverage<br />
- Corporate monitoring: Addressing security, privacy, and temptation in the workplace<br />
- Cloud computing and recovery, not just backup<br />
- EJBCA: Make your own certificate authority<br />
- Advanced attack detection using OSSIM<br />
- The world of claims-based security<br />
- Enterprise Authentication: Increasing security without breaking the bank<br />
]]></description></item>


<item><title>(IN)SECURE Magazine Issue 24</title>   <link>http://www.net-security.org/insecuremag.php</link><description><![CDATA[Articles in this issue include: <br /><br />

- Writing a secure SOAP client with PHP: Field report from a real-world project<br />
- How virtualized browsing shields against web-based attacks<br />
- Review: 1Password 3<br />
- Preparing a strategy for application vulnerability detection<br />
- Threats 2.0: A glimpse into the near future<br />
- Preventing malicious documents from compromising Windows machines<br />
- Balancing productivity and security in a mixed environment<br />
- AES and 3DES comparison analysis<br />
- OSSEC: An introduction to open source log and event management<br />
- Book review - Hacking: The Next Generation<br />
- Q&A: Sandra Toms LaPedis on RSA Conference 2010<br />
- Secure and differentiated access in enterprise wireless networks<br />
- Achieving continuous PCI compliance with IT GRC<br />
]]></description></item>


<item><title>(IN)SECURE Magazine Issue 23</title>   <link>http://www.net-security.org/insecuremag.php</link><description><![CDATA[Articles in this issue include: <br /><br />

- Microsoft's security patches year in review: A malware researcher's perspective<br />
- A closer look at Red Condor Hosted Service<br />
- Report: RSA Conference Europe 2009, London<br />
- The U.S. Department of Homeland Security has a vision for stronger information security<br />
- Q&A: Didier Stevens on malicious PDFs<br />
- Protecting browsers, endpoints and enterprises against new Web-based attacks<br />
- Mobile spam: An old challenge in a new guise<br />
- Report: BruCON security conference, Brussels<br />
- Are you putting your business at risk?<br />
- Why out-of-band transactions verification is critical to protecting online banking<br />
- Study uncovers alarming password usage behavior<br />
- Q&A: Noise vs. Subversive Computing with Pascal Cretain<br />
- Elevating email to an enterprise-class database application solution<br />
- Ask the social engineer: Practice<br />
- Report: Storage Expo 2009, London<br />
- Jumping fences - the ever decreasing perimeter<br />
]]></description></item>

<item><title>(IN)SECURE Magazine Issue 22</title>   <link>http://www.net-security.org/insecuremag.php</link><description><![CDATA[Articles in this issue include: <br /><br />

- Using real-time events to drive your network scans<br />
- Review: Data Locker<br />
- The Nmap project: Open source with style<br />
- Enterprise effectiveness of digital certificates: Are they ready for prime-time?<br />
- A look at geolocation, URL shortening and top Twitter threats<br />
- How "fake stuff" can make you more secure<br />
- Making clouds secure<br />
- Q&A: Dr. Herbert Thompson on security ROI and RSA Conference<br />
- Book review - Cyber Crime Fighters: Tales from the Trenches<br />
- Top 5 myths about wireless protection<br />
- Securing the foundation of IT systems<br />
- A layered approach to making your Web application a safer environment<br />
- In mashups we trust?<br />
- Adopting the security best practice of least privilege<br />
- Is your data recovery provider a data security problem?<br />
- New strategies for establishing a comprehensive lifetime data protection program<br />
- Security for multi-enterprise applications<br />
- EU data breach notification proposals: How will your business be affected?<br />
- Book review - 97 Things Every Software Architect Should Know<br />
- Safety in the cloud: How CIOs can ensure the safety of their data as they migrate to cloud applications<br />
- Vulnerability management<br />
]]></description></item>


<item><title>(IN)SECURE Magazine Issue 21</title>   <link>http://www.net-security.org/insecuremag.php</link><description><![CDATA[Articles in this issue include: <br /><br />

- Malicious PDF: Get owned without opening<br />
- Review: IronKey Personal<br />
- Windows 7 security features: Building on Vista<br />
- Web 2.0 emerging threats<br />
- Using Wireshark to capture and analyze wireless traffic<br />
- Q&A: Paul Cooke on Windows 7<br />
- RSA Conference 2009<br />
- Your applications are trying to tell you something - are you listening?<br />
- Q&A: Hord Tipton on certification and (ISC)2<br />
- "Unclonable" RFID - a technical overview<br />
- The application security maturity (ASM) model<br />
- Secure development principles<br />
- Enterprise risk and compliance reporting<br />
- Q&A: Ron Gula on Nessus and Tenable Network Security<br />
- Infosecurity Europe 2009<br />
- Establish your social media presence with security in mind<br />
- HTTPS is bad?<br />
- A historical perspective on the cybersecurity dilemma<br />
- Q&A: Brent Huston on security in general, CEO challenges and Microsolved<br />
- Black Hat Europe 2009<br />
- Germany: The current debate on the Internet filter<br />
- A risk-based, cost effective approach to holistic security<br />
]]></description></item>



<item><title>(IN)SECURE Magazine Issue 20</title>   <link>http://www.net-security.org/insecuremag.php</link><description><![CDATA[Articles in this issue include: <br /><br />

- Improving network discovery mechanisms<br />
- Building a bootable BackTrack 4 thumb drive with persistent changes and Nessus<br />
- Review: SanDisk Cruzer Enterprise<br />
- Forgotten document of American history offers a model for President Obama's vision of government information technology<br />
- Security standpoint by Sandro Gauci: The year that Internet security failed<br />
- What you need to know about tokenization<br />
- Q&A: Vincenzo Iozzo on Mac OS X security<br />
- Book review - Hacking VoIP: Protocols, Attacks and Countermeasures<br />
- A framework for quantitative privacy measurement<br />
- Why fail? Secure your virtual assets<br />
- Q&A: Scott Henderson on the Chinese underground<br />
- iPhone security software review: Data Guardian<br />
- Phased deployment of Network Access Control<br />
- Playing with authenticode and MD5 collisions<br />
- Web 2.0 case studies: challenges, approaches and vulnerabilities<br />
- Q&A: Jason King, CEO of Lavasoft<br />
- Book review - Making Things Happen: Mastering Project Management<br />
- ISP level malware filtering<br />
- The impact of the consumerization of IT on IT security management<br />
]]></description></item>

<item><title>(IN)SECURE Magazine Issue 19</title>   <link>http://www.net-security.org/insecuremag.php</link><description><![CDATA[Articles in this issue include: <br /><br />

- The future of AV: looking for the good while stopping the bad<br />
- Security standpoint by Sandro Gauci: How security can hurt us
-Review: Eikon To Go<br />
- Eight holes in Windows login controls<br />
- Interview with Giles Hogben, an expert on identity and authentication technologies working at ENISA<br />
- Extended validation and online security: EV SSL gets the green light<br />
- Web filtering in a Web 2.0 world<br />
- RSA Conference Europe 2008<br />
- The role of password management in compliance with the data protection act<br />
- Interview with Rich Mogull, founder of Securosis<br />
- 5 strategies for proactively embracing failure<br />
- The present and future of Web application security discussed in Portugal<br />
- Securing data beyond PCI in a SOA environment: best practices for advanced data protection<br />
- Navigating a sea of fake codecs<br />
- Role Based Access Control<br />
- How to build a security strategy to grow your career, success and results<br />
- Three undocumented layers of the OSI model and their impact on security<br />]]></description></item>

<item><title>(IN)SECURE Magazine Issue 18</title>   <link>http://www.net-security.org/insecuremag.php</link><description>Articles in this issue include:  Security standpoint by Sandro Gauci: Closing a can of worms, Network and information security in Europe today, Browser security: bolt it on, then build it in, Passive network security analysis with NetworkMiner, Lynis - an introduction to UNIX system auditing, Windows driver vulnerabilities: the METHOD_NEITHER odyssey, Removing software armoring from executables, Insecurities in privacy protection software, A proactive approach to data breaches, Compliance does not equal security but it's a good start, Secure web application development, Avoiding a "keys to the kingdom" attack without compromising security, The insider threat, Web application security: risky business?, Enterprise application security: how to balance the use of code reviews and web application firewalls for PCI compliance.</description></item>

<item><title>(IN)SECURE Magazine Issue 17</title>   <link>http://www.net-security.org/insecuremag.php</link><description>Security standpoint by Sandro Gauci: when best intentions go wrong, Review: Red Condor Hosted Service, Reverse engineering software armoring (part 1), Security training and awareness: strengthening your weakest link, Hacking Second Life, Building a secure wireless network for under $300, Assessing risk in VoIP/UC networks, Open redirect vulnerabilities: definition and prevention, Migration from e-mail to web borne threats, Bypassing and enhancing live behavioral protection, Point security solutions are not a 4 letter word, The future of security is information-centric, Corporate due diligence in India: an ICT perspective, E-mail encryption service: a smart choice for SMBs, Securing the enterprise data flow against advanced attacks, How to prevent identity theft and  Security flaws identification and technical risk analysis through threat modeling.</description></item>

<item><title>(IN)SECURE Magazine Issue 16</title>   <link>http://www.net-security.org/insecuremag.php</link><description>Articles in this issue include: Security policy considerations for virtual worlds, US political elections and cybercrime, Using packet analysis for network troubleshooting, The effectiveness of industry certifications, Building a secure future: lessons learned from 2007's highest-profile security events, Advanced social engineering and human exploitation, part 2, Interview with Nitesh Dhanjani, Senior Manager at Ernst and Young, Is your data safe? Secure your web apps, RSA Conference 2008, Producing secure software with security enhanced software development processes, Network event analysis with Net/FSE, Security risks for mobile computing on public WLANs: hotspot registration, Black Hat Europe 2008 Briefings and Training, A Japanese perspective on Software Configuration Management, Windows log forensics: did you cover your tracks?, Traditional vs. non-tranditional database auditing, Payment card data: know your defense options.</description></item>

<item><title>(IN)SECURE Magazine Issue 15</title>   <link>http://www.net-security.org/insecuremag.php</link><description>Articles in this issue include: Proactive analysis of malware genes holds the key to network security, Advanced social engineering and human exploitation, part 1, Free visualization tools for security analysis and network monitoring, Hiding inside a rainbow, Internet terrorist: does such a thing really exist?, Weaknesses and protection of your wireless network, Fraud mitigation and biometrics following Sarbanes-Oxley, QualysGuard visual walkthrough, Application security matters: deploying enterprise software securely, Web application vulnerabilities and insecure software root causes: solving the software security problem from an information security perspective, A dozen demons profiting at your (jn)convenience, The insider threat: hype vs. reality, Interview with Andre Muscat, Director of Engineering at GFI Software, How B2B gateways affect corporate information security, Reputation attacks, a little known Internet threat, Italian bank's XSS opportunity seized by fraudsters, The good, the bad and the ugly of protecting data in a retail environment, Interview with Mikko Hypponen is the Chief Research Officer for F-Secure, Interview with Richard Jacobs, Technical Director of Sophos and Interview with Raimund Genes, CTO Anti-Malware at Trend Micro.
</description></item>

<item><title>(IN)SECURE Magazine Issue 14</title>   <link>http://www.net-security.org/insecuremag.php</link><description>One lucky (IN)SECURE reader can get a Linksys WRTG54G Wireless-G Router accompanied with the "Linksys WRTG54G Ultimate Hacking" book. Articles in this issue include:

- Attacking consumer embedded devices
- Review: QualysGuard
- CCTV: technology in transition - analog or IP?
- Interview with Robert "RSnake" Hansen, CEO of SecTheory
- The future of encryption
- Endpoint threats
- Review: Kaspersky Internet Security 7.0
- Interview with Amol Sarwate, Manager, Vulnerability Research Lab, Qualys Inc.
- Network access control: bridging the network security gap
- Change and configuration solutions aid PCI auditors
- Data protection and identity management while browsing and transacting over the Internet
- Information security governance: the nuts and bolts
- Securing moving targets
- The need for a new security approach
- Data insecurity: lessons learned?
- Wi-Fi safety and security.

We also have a special wireless security topic: "6 CTOs, 10 Burning Questions". The CTOs we talked with include:

- Dr. Amit Sinha, VP and CTO of AirDefense
- Chia Chee Kuan, CTO and VP of Engineering of AirMagnet
- Merwyn Andrade, CTO of Aruba Networks
- Pravin Bhagwat, co-founder and CTO of AirTight Networks
- Magued Barsoum, CTO of Fortress Technologies
- Dan Simone, VP and CTO of Trapeze Networks
</description></item>


<item><title>(IN)SECURE Magazine Issue 13</title>   <link>http://www.insecuremag.com/</link><description>Articles in this issue include:

 - Interview with Janne Uusilehto, Head of Nokia Product Security
 - Social engineering social networking services: a LinkedIn example
 - The case for automated log management in meeting HIPAA compliance
 - Risk decision making: whose call is it?
 - Interview with Zulfikar Ramzan, Senior Principal Researcher with the Advanced  - Threat Research team at Symantec
 - Securing VoIP networks: fraud
 - PCI DSS compliance: a difficult but necessary journey
 - A security focus on China outsourcing
 - A multi layered approach to prevent data leakage
 - Safeguard your organization with proper password management
 - Interview with Ulf Mattsson, Protegrity CTO
 - DEFCON 15
 - File format fuzzing
 - IS2ME: Information Security to Medium Enterprise

+ We are having another book giveaway!

</description></item>


<item><title>(IN)SECURE Magazine Issue 12</title>   <link>http://www.insecuremag.com/</link><description>Articles in this issue include: 

- Enterprise grade remote access
- Review: Centennial Software DeviceWall 4.6
- Solving the keylogger conundrum
- Interview with Jeremiah Grossman, CTO of WhiteHat Security
- The role of log management in operationalizing PCI compliance
- Windows security: how to act against common attack vectors
- Taking ownership of the Trusted Platform Module chip on Intel Macs
- Compliance, IT security and a clear conscience
- Key management for enterprise data encryption
- The menace within
- A closer look at the Cisco CCNP Video Mentor
- Network Access Control

+ We are having a book giveaway!

</description></item>

<item><title>(IN)SECURE Magazine Issue 11</title>   <link>http://www.insecuremag.com/</link><description>Articles in this issue include: On the security of e-passports, Review: GFI LANguard Network Security Scanner 8, Critical steps to secure your virtualized environment, Interview with Howard Schmidt, President and CEO R and H Security Consulting, Quantitative look at penetration testing, Integrating ISO 17799 into your Software Development Lifecycle, Public Key Infrastructure (PKI): dead or alive?, Interview with Christen Krogh, Opera Software's Vice President of Engineering, Super ninja privacy techniques for web application developers, Security economics, iptables - an introduction to a robust firewall, Black Hat Briefings and Training Europe 2007 and Enforcing the network security policy with digital certificates.

</description></item>


<item><title>(IN)SECURE Magazine Issue 10</title>   <link>http://www.insecuremag.com/</link><description>Articles in this issue include: Microsoft Windows Vista: significant security improvement?, Review: GFI Endpoint Security 3, Interview with Edward Gibson, Chief Security Advisor at Microsoft UK, Top 10 spyware of 2006, The spam problem and open source filtering solutions, Office 2007: new format and new protection/security policy, Wardriving in Paris, Interview with Joanna Rutkowska, security researcher, Climbing the security career mountain: how to get more than just a job, RSA Conference 2007 report, ROT13 is used in Windows? You're joking! and Data security beyond PCI compliance - protecting sensitive data in a distributed environment.

</description></item>


<item><title>(IN)SECURE Magazine Issue 9</title>   <link>http://www.insecuremag.com/</link><description>Articles in this issue include: Effectiveness of security by admonition: a case study of security warnings in a web browser setting, Interview with Kurt Sauer, CSO at Skype, Web 2.0 defense with AJAX fingerprinting and filtering, Hack In The Box Security Conference 2006, Where iSCSI fits in enterprise storage networking, Recovering user passwords from cached domain records, Do portable storage solutions compromise business security?, Enterprise data security - a case study and Creating business through virtual trust: how to gain and sustain a competitive advantage using information security.

</description></item>

<item><title>(IN)SECURE Magazine Issue 8</title>   <link>http://www.insecuremag.com/archive.html</link><description>Articles in this issue include: Payment Card Industry demystified, Skype: how safe is it?, Computer forensics vs. electronic evidence, Review: Acunetix Web Vulnerability Scanner, SSH port forwarding - security from two perspectives, part two, Log management in PCI compliance, Airscanner vulnerability summary: Windows Mobile security software
fails the test, Proactive protection: a panacea for viruses?, Introducing the MySQL Sandbox and Continuous protection of enterprise data: a comprehensive approach</description></item>

<item><title>(IN)SECURE Magazine Issue 7</title>   <link>http://www.insecuremag.com/archive.html</link><description>Articles in this issue include: SSH port forwarding: security from two perspectives, part one, An inside job, CEO spotlight: Q and A with Patricia Sueltz at SurfControl, Server monitoring with munin and monit, Compliance vs. awareness in 2006, 2005 *nix malware evolution, Overview of quality security podcasts and coverage of Infosecurity 2006 and InfoSec World 2006.</description></item>

<item><title>(IN)SECURE Magazine Issue 6</title>   <link>http://www.insecuremag.com/archive.html</link><description>Articles in this issue include: Best practices in enterprise database protection, Quantifying the cost of spyware to the enterprise, Security for websites  - breaking sessions to hack into a machine, How to win friends and influence people with IT security certifications, The size of security: the evolution and history of OSSTMM operational security metrics, Interview with Kenny Paterson, Professor of Information Security at Royal Holloway, University of London, PHP and SQL security today, Apache security: Denial of Service attacks, War-driving in Germany  - CeBIT 2006</description></item>

<item>  
<title>(IN)SECURE Magazine Issue 5</title>   <link>http://www.insecuremag.com/archive.html</link>   
<description>Articles in this issue include: Web application firewalls primer, Review: Trustware BufferZone 1.6, Threat analysis using log data, Looking back at computer security in 2005, Writing an enterprise handheld security policy, Digital Rights Management, Revenge of the Web mob, Hardening Windows Server 2003 platforms made easy and Filtering spam server-side</description>  
</item>

  <item>

  <title>(IN)SECURE Magazine Issue 4</title> 

  <link>http://www.insecuremag.com/archive.html</link> 

  <description>Articles in this issue include: Structured traffic analysis, Access Control Lists in Tiger and Tiger Server - true permission management, Automating I.T. security audits, Biometric security, PDA attacks, part 2: airborne viruses - evolution of the latest threats, Build a custom firewall computer, Lock down your kernel with grsecurity, Interview with Sergey Ryzhikov, director of Bitrix, Best practices for database encryption solutions</description>

  </item>


  <item>

  <title>(IN)SECURE Magazine Issue 3</title> 

  <link>http://www.insecuremag.com/archive.html</link> 

  <description>Articles in this issue include: Security vulnerabilities, exploits and patches, PDA attacks: palm sized devices - PC sized threats, Adding service signatures to Nmap, CSO and CISO - perception vs. reality in the security kingdom, Unified threat management: IT security's silver bullet?, The reality of SQL injection, 12 months of progress for the Microsoft Security Response Centre, Interview with Michal Zalewski, security researcher, OpenSSH for Macintosh and Method for forensic validation of backup tape.</description>

  </item>



  <item>

  <title>(IN)SECURE Magazine Issue 2</title> 

  <link>http://www.insecuremag.com/archive.html</link> 

  <description>Articles in this issue include: Information security in campus and open environments, Web applications worms - the next Internet infestation, Integrating automated patch and vulnerability management into an enterprise-wide environment, Advanced PHP security - vulnerability containment, Protecting an organization's public information, Application security: the noveau blame game, What you need to know before migrating your applications to the Web, Clear cut cryptography and How to lock down enterprise data with infrastructure services.</description> 

  </item>



  <item>

  <title>(IN)SECURE Magazine Issue 1</title> 

  <link>http://www.insecuremag.com/archive.html</link> 

  <description>Articles in this issue include: Does Firefox really provide more security than Internet Explorer?, Security risks associated with portable storage devices, 10 tips on protecting customer information from identity theft, Linux security - is it ready for the average user?, How to secure your wireless network, Considerations for preventing information leakage, An introduction to securing Linux with Apache, ProFTPd and Samba and Security vulnerabilities in PHP Web applications</description>

  </item>



  </channel>

  </rss>



