Page 2 - Cyber Defense eMagazine - January 2018
P. 2

CONTENTS







               From the Editor’s Desk ..................................................................................................... 3

               Top IoT app ideas and IoT security enhancement with Blockchain .......................................... 5

               Raising Your Threat IQ: The Importance of Democratizing Threat Intelligence ........................ 9

               The serverless computing: The pluses and minuses of this very new concept ........................ 13

               Biometrics:  Validation and Authentication with a Selfie ...................................................... 17
               Why AI Is Exactly What the Cybersecurity Industry Needs .................................................... 21

               The State of PKI Management ............................................................................................. 26

               Cybersecurity in 2018 - The Kosciuszko Institute publishes experts' forecasts ........................ 30

               Congratulations to the Cyber Security Leaders of 2017 ......................................................... 36

               How To Implement an Effective Vulnerability Management Program ................................... 45

               Time to Hire a CISO… Where to Start? .................................................................................. 50

               Four Important Truths to Guide Your Access Management ..................................... 54
               A New Security Approach in the Age of Cyber Warfare ......................................................... 59

               KRACK is Just The Tip of the Wi-Fi Router Security Vulnerability Iceberg ............................... 64

               Rootkit Redux ...................................................................................................................... 70

               5 Things to Consider while using Unsecured Open Wi-Fi ....................................................... 75

               The 3 “Must Haves” for Improving Any Company’s Security Posture ..................................... 80

               Learn the Cyber Threat Framework from the ODNI.gov ........................................................ 86
               Reviewing Last Month’s Ransomware .................................................................................. 95

               Top Twenty INFOSEC Open Sources ......................................................................... 105

               Job Opportunities ......................................................................................................... 105

               Free Monthly Cyber Defense eMagazine Via Email .................................................. 115

               MARKETING AND PARTNERSHIP OPPORTUNITIES ............................................... 116




                     2   Cyber Defense eMagazine – January 2018 Edition
                         Copyright © 2018, Cyber Defense Magazine,  All rights reserved worldwide.
   1   2   3   4   5   6   7