Page 2 - Cyber Defense eMagazine - July 2018
P. 2
CONTENTS
Operation Eligible Receiver - The Birthplace of Cybersecurity: Configurations.... 13
How GDPR costs could widen the gap between small and large businesses ........ 17
Cyber Defense is All About the Offense ............................................................................ 20
Traditional Security Defences May Prove Inadequate for Effective GDPR
Strategies, Warns Aruba ........................................................................................................ 24
There is No Silver Bullet for Cyber Security but Unified Defense is Best Approach
for Companies........................................................................................................................... 26
The Next Generation of Cyber-AI Defense and the Emerging AI-Driven IoT Botnet
Crisis............................................................................................................................................ 29
Why regular testing is important for GDPR compliance ............................................... 32
The Impact of Usability on Phishing: Prevention Effectiveness................................ 35
Rampart de Troika: A Three-Step Process to Overcome Cybersecurity’s Top
Threat .......................................................................................................................................... 42
Shine a Light on App Security.............................................................................................. 45
Is the Security of Blockchain an Advantage for Online Businesses? ....................... 48
How to Be Intelligent about Threat Intelligence............................................................... 52
Comparing Cyber Insurance policies ................................................................................. 55
Limiting The Impact Of Brute Force Attacks Against Your WordPress Site ........... 59
Four Hidden Costs and Cybersecurity Risks of sudo ................................................... 62
How Consistent Security Reporting in Government Could Prevent the Next
WannaCry Exploit .................................................................................................................... 66
The Perfect Storm Driving the Growth of Ransomware ................................................ 69
Choosing the Right Encrypted USB Flash Drive for Your Needs ............................... 73
2 Cyber Defense eMagazine – July 2018 Edition
Copyright © 2018, Cyber Defense Magazine, All rights reserved worldwide.