Page 2 - Cyber Defense eMagazine - July 2018
P. 2

CONTENTS






               Operation Eligible Receiver - The Birthplace of Cybersecurity: Configurations.... 13

               How GDPR costs could widen the gap between small and large businesses ........ 17
               Cyber Defense is All About the Offense ............................................................................ 20

               Traditional Security Defences May Prove Inadequate for Effective GDPR
               Strategies, Warns Aruba ........................................................................................................ 24

               There is No Silver Bullet for Cyber Security but Unified Defense is Best Approach
               for Companies........................................................................................................................... 26

               The Next Generation of Cyber-AI Defense and the Emerging AI-Driven IoT Botnet
               Crisis............................................................................................................................................ 29
               Why regular testing is important for GDPR compliance ............................................... 32

               The Impact of Usability on Phishing:  Prevention Effectiveness................................ 35

               Rampart de Troika: A Three-Step Process to Overcome Cybersecurity’s Top
               Threat .......................................................................................................................................... 42
               Shine a Light on App Security.............................................................................................. 45

               Is the Security of Blockchain an Advantage for Online Businesses? ....................... 48

               How to Be Intelligent about Threat Intelligence............................................................... 52

               Comparing Cyber Insurance policies ................................................................................. 55
               Limiting The Impact Of Brute Force Attacks Against Your WordPress Site ........... 59

               Four Hidden Costs and Cybersecurity Risks of sudo ................................................... 62

               How Consistent Security Reporting in Government Could Prevent the Next
               WannaCry Exploit .................................................................................................................... 66

               The Perfect Storm Driving the Growth of Ransomware ................................................ 69
               Choosing the Right Encrypted USB Flash Drive for Your Needs ............................... 73











                     2   Cyber Defense  eMagazine – July 2018 Edition
                         Copyright © 2018, Cyber Defense Magazine,  All rights reserved worldwide.
   1   2   3   4   5   6   7