ISSUE 20 (March 2009)
Mac OS X (in)security
ISSUE 20
Issue 20 Contributors
Pekka Andelin
Malware Researcher at Lavasoft
Ofir Arkin
Co-founder and CTO of Insightix and Sys-Security Group
Paul Clements
Lead software architect at SteelEye Technology, Inc.
Yarochkin Fyodor
Graduate student at the National Taiwan University
Rick Leclerc
VP Technology Partnerships at Bradford Networks
Alexei Lesnykh
Business Development Manager at DeviceLock
Gary Palgon
Vice President of Product Management for nuBridges
Vimal Patel
Founder of Blueinfy
Kevin Riggins
Senior Information Security Analyst for Principal Financial Group
Darran Rolls
CTO of SailPoint Technologie
Aaron D. Sanders
Organization Information Security Manager for Xerox Global Services
Shreeraj Shah
Founder and director of Blueinf,
Didier Stevens
IT Security Consultant

Mac OS X (in)security

PDF download
Read issue 20 now
Share

Table of contents

  • Improving network discovery mechanisms
  • Building a bootable BackTrack 4 thumb drive with persistent changes and Nessus
  • What you need to know about tokenization
  • Q&A: Vincenzo Iozzo on Mac OS X security
  • A framework for quantitative privacy measurement
  • Why fail? Secure your virtual assets
  • Phased deployment of Network Access Control
  • Web 2.0 case studies: challenges, approaches and vulnerabilities
  • ISP level malware filtering
  • Q&A: Scott Henderson on the Chinese underground

(IN)SECURE Magazine archive More →

ISSUE 72(July, 2022 )
  • 7 threat detection challenges CISOs face and what they can do about it
  • How to set up a powerful insider threat program
  • An offensive mindset is crucial for effective cyber defense
go to issue
ISSUE 71.5(June, 2022 )

Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and more.

go to issue
ISSUE 71(March, 2022 )
  • Why security strategies need a new perspective
  • The evolution of security analytics
  • Open-source code: How to stay secure while moving fast
go to issue