ISSUE 72(July, 2022 )
  • 7 threat detection challenges CISOs face and what they can do about it
  • How to set up a powerful insider threat program
  • An offensive mindset is crucial for effective cyber defense
go to issue
ISSUE 71.5(June, 2022 )

Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and more.

go to issue
ISSUE 71(March, 2022 )
  • Why security strategies need a new perspective
  • The evolution of security analytics
  • Open-source code: How to stay secure while moving fast
go to issue
ISSUE 70(November, 2021 )
  • How to develop a skilled cybersecurity team
  • Securing your WordPress website against ransomware attacks
  • How to prevent corporate credentials ending up on the dark web
go to issue
ISSUE 69(July, 2021 )
  • Why threat hunting is obsolete without context
  • Defending against Windows RDP attacks
  • Navigating the waters of maritime cybersecurity
go to issue
ISSUE 68(March, 2021 )
  • Physical cyber threats: What do criminals leave when they break in?
  • Review: Group-IB Fraud Hunting Platform
  • Tips for boosting the “Sec” part of DevSecOps
go to issue
ISSUE 67(November, 2020 )
  • Hardware security: Emerging attacks and protection mechanisms
  • Justifying your 2021 cybersecurity budget
  • Cooking up secure code: A foolproof recipe for open source
  • Mapping the motives of insider threats
go to issue
ISSUE 66(June, 2020 )
  • Let’s be realistic about our expectations of AI
  • Full-time bug hunting: Pros and cons of an emerging career
  • Crowdsourced pentesting is not without its issues
go to issue
ISSUE 65.5(March, 2020 )

More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center in San Francisco to explore the Human Element in cybersecurity through hundreds of keynote presentations, track sessions, tutorials, seminars and special events.

go to issue
ISSUE 65(February, 2020 )
  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue
    ISSUE 64(December, 2019 )
    • Could audio warnings augment your ability to fight off cyberattacks?
    • Your supplier’s BEC problem is your BEC problem
    • Unmask cybercriminals through identity attribution
    • Want to build a SOC? Here is what you need to know beforehand
    go to issue
    ISSUE 63(September, 2019 )
    • Identifying evasive threats hiding inside the network
    • Inside the NIST team working to make cybersecurity more user-friendly
    • Report: Black Hat USA 2019
    • Healthcare’s blind spot: Unmanaged IoT and medical devices
    go to issue

    (IN)SECURE Magazine archive More →

    ISSUE 72(July, 2022 )
    • 7 threat detection challenges CISOs face and what they can do about it
    • How to set up a powerful insider threat program
    • An offensive mindset is crucial for effective cyber defense
    go to issue
    ISSUE 71.5(June, 2022 )

    Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and more.

    go to issue
    ISSUE 71(March, 2022 )
    • Why security strategies need a new perspective
    • The evolution of security analytics
    • Open-source code: How to stay secure while moving fast
    go to issue