(IN)SECURE Magazine from Net-Security (PDF download)

A little more light reading :-)
Latest issue, #13:      
http://www.net-security.org/insecuremag.php
(86 pages, with ads [not animated ads] - like a printed magazine)
Archives of past issues:
http://www.net-security.org/insecure-archive.php
ISSUE 13 (September 2007)
     * Interview with Janne Uusilehto, Head of Nokia Product Security
     * Social engineering social networking services: a LinkedIn example
     * The case for automated log management in meeting HIPAA compliance
     * Risk decision making: whose call is it?
     * Interview with Zulfikar Ramzan, Senior Principal Researcher with 
the Advanced Threat Research team at Symantec
     * Securing VoIP networks: fraud
     * PCI DSS compliance: a difficult but necessary journey
     * A security focus on China outsourcing
     * A multi layered approach to prevent data leakage
     * Safeguard your organization with proper password management
     * Interview with Ulf Mattsson, Protegrity CTO
     * DEFCON 15
     * File format fuzzing
     * IS2ME: Information Security to Medium Enterprise
ISSUE 12 (July 2007)
     * Enterprise grade remote access
     * Review: Centennial Software DeviceWall 4.6
     * Solving the keylogger conundrum
     * Interview with Jeremiah Grossman, CTO of WhiteHat Security
     * The role of log management in operationalizing PCI compliance
     * Windows security: how to act against common attack vectors
     * Taking ownership of the Trusted Platform Module chip on Intel Macs
     * Compliance, IT security and a clear conscience
     * Key management for enterprise data encryption
     * The menace within
     * A closer look at the Cisco CCNP Video Mentor
     * Network Access Control.
ISSUE 11 (May 2007)
     * On the security of e-passports
     * Review: GFI LANguard Network Security Scanner 8
     * Critical steps to secure your virtualized environment
     * Interview with Howard Schmidt, President and CEO R & H Security 
Consulting
     * Quantitative look at penetration testing
     * Integrating ISO 17799 into your Software Development Lifecycle
     * Public Key Infrastructure (PKI): dead or alive?
     * Interview with Christen Krogh, Opera Software's Vice President of 
Engineering
     * Super ninja privacy techniques for web application developers
     * Security economics
     * iptables - an introduction to a robust firewall
     * Black Hat Briefings & Training Europe 2007
     * Enforcing the network security policy with digital certificates.
ISSUE 10 (February 2007)
     * Microsoft Windows Vista: significant security improvement?
     * Review: GFI Endpoint Security 3
     * Interview with Edward Gibson, Chief Security Advisor at Microsoft UK
     * Top 10 spyware of 2006
     * The spam problem and open source filtering solutions
     * Office 2007: new format and new protection/security policy
     * Wardriving in Paris
     * Interview with Joanna Rutkowska, security researcher
     * Climbing the security career mountain: how to get more than just 
a job
     * RSA Conference 2007 report
     * ROT13 is used in Windows? You're joking!
     * Data security beyond PCI compliance - protecting sensitive data 
in a distributed environment.
ISSUE 9 (December 2006)
     * Effectiveness of security by admonition: a case study of security 
warnings in a web browser setting
     * Interview with Kurt Sauer, CSO at Skype
     * Web 2.0 defense with AJAX fingerprinting and filtering
     * Hack In The Box Security Conference 2006
     * Where iSCSI fits in enterprise storage networking
     * Recovering user passwords from cached domain records
     * Do portable storage solutions compromise business security?
     * Enterprise data security - a case study
     * Creating business through virtual trust: how to gain and sustain 
a competitive advantage using information security.
ISSUE 8 (September 2006)
     * Payment Card Industry demystified
     * Skype: how safe is it?
     * Computer forensics vs. electronic evidence
     * Review: Acunetix Web Vulnerability Scanner 4.0
     * SSH port forwarding - security from two perspectives, part two
     * Log management in PCI compliance
     * Airscanner vulnerability summary: Windows Mobile security 
software fails the test
     * Proactive protection: a panacea for viruses?
     * Introducing the MySQL Sandbox
     * Continuous protection of enterprise data: a comprehensive approach.
ISSUE 7 (June 2006)
     * SSH port forwarding: security from two perspectives, part one
     * An inside job
     * CEO spotlight: Q&A with Patricia Sueltz, SurfControl
     * Server monitoring with munin and monit
     * Compliance vs. awareness in 2006
     * Infosecurity 2006
     * 2005 *nix malware evolution
     * InfoSec World 2006
     * Overview of quality security podcasts.
ISSUE 6 (March 2006)
     * Best practices in enterprise database protection
     * Quantifying the cost of spyware to the enterprise
     * Security for websites - breaking sessions to hack into a machine
     * How to win friends and influence people with IT security 
certifications
     * The size of security: the evolution and history of OSSTMM 
operational security metrics
     * Interview with Kenny Paterson, Professor of Information Security 
at Royal Holloway, University of London
     * PHP and SQL security today
     * Apache security: Denial of Service attacks
     * War-driving in Germany - CeBIT 2006.
ISSUE 5 (January 2006)
     * Web application firewalls primer
     * Review: Trustware BufferZone 1.6
     * Threat analysis using log data
     * Looking back at computer security in 2005
     * Writing an enterprise handheld security policy
     * Digital Rights Management
     * Revenge of the Web mob
     * Hardening Windows Server 2003 platforms made easy
     * Filtering spam server-side.
ISSUE 4 (October 2005)
     * Structured traffic analysis
     * Access Control Lists in Tiger and Tiger Server - true permission 
management
     * Automating I.T. security audits
     * Biometric security
     * PDA attacks, part 2: airborne viruses - evolution of the latest 
threats
     * Build a custom firewall computer
     * Lock down your kernel with grsecurity
     * Interview with Sergey Ryzhikov, director of Bitrix
     * Best practices for database encryption solutions.
ISSUE 3 (August 2005)
     * Security vulnerabilities, exploits and patches
     * PDA attacks: palm sized devices - PC sized threats
     * Adding service signatures to Nmap
     * CSO and CISO - perception vs. reality in the security kingdom
     * Unified threat management: IT security's silver bullet?
     * The reality of SQL injection
     * 12 months of progress for the Microsoft Security Response Centre
     * Interview with Michal Zalewski, security researcher
     * OpenSSH for Macintosh
     * Method for forensic validation of backup tape.
ISSUE 2 (June 2005)
     * Information security in campus and open environments
     * Web applications worms - the next Internet infestation
     * Integrating automated patch and vulnerability management into an 
enterprise-wide environment
     * Advanced PHP security - vulnerability containment
     * Protecting an organization๏ฟฝs public information
     * Application security: the noveau blame game
     * What you need to know before migrating your applications to the Web
     * Clear cut cryptography
     * How to lock down enterprise data with infrastructure services.
ISSUE 1 (April 2005)
     * Does Firefox really provide more security than Internet Explorer?
     * Security risks associated with portable storage devices
     * 10 tips on protecting customer information from identity theft
     * Linux security - is it ready for the average user?
     * How to secure your wireless network
     * Considerations for preventing information leakage
     * An introduction to securing Linux with Apache, ProFTPd & Samba
     * Security vulnerabilities in PHP Web applications.
0
Al
10/16/2007 1:52:13 AM
๐Ÿ“ grc.security
๐Ÿ“ƒ 16608 articles.
โญ 3 followers.

๐Ÿ’ฌ 0 Replies
๐Ÿ‘๏ธโ€๐Ÿ—จ๏ธ 2246 Views


Reply: