Page 2 - Cyber Defense eMagazine - June 2018
P. 2

CONTENTS




               How GDPR costs could widen the gap between small and large businesses ........ 12

               On the Clock .............................................................................................................................. 15
               5 Things Everyone Needs to Know About Cybersecurity............................................. 20

               Should Hacking Course Be A Part Of University Curriculum ...................................... 23

               Protect your business with layers of defense.................................................................. 27

               How Deception Technology Helps CIOs Meet the Challenges of Cyber security .. 30
               How to Ensure Shared Responsibility for Internet Security ........................................ 35

               The Impact of Usability on Phishing ................................................................................... 37

               One in Five Android Apps Have Numerous Known Security Flaws .......................... 44

               How Artificial Intelligence based Machine Learning will Affect IT Security............. 47
               Being Prepared to Keep Your E-commerce Store's Data Safe .................................... 49

               Synthetic Identity Fraud and Social Engineering are Growing Concerns and on
               the Rise ....................................................................................................................................... 52

               Warning Signs For Managing Cyber Security .................................................................. 54
               IoT Environment compromising Cyber Security ............................................................. 58

               Are We Solving The Right Problem? .................................................................................. 63

               Shine a Light on App Security.............................................................................................. 67

               Could cryptocurrencies  be a better and more effective way of the society's
               control?....................................................................................................................................... 69
               How to get prepared to cope with the deep reforms of a community? ..................... 71

               Virtual Private Networks: Checking, tracking and breaking ........................................ 73

               SECURING YOUR CODE FOR GDPR COMPLIANCE ...................................................... 75

               Wake-up Call for Enterprise Resource Planning Users................................................. 85
               Deception Technology—Useful Tool or Just More Busywork? .................................. 88

               DDoS Attack Evolution: The Power of UDP Amplification ........................................... 91

               Wake-up Call for ERP Users ................................................................................................. 97





                     2   Cyber Defense  eMagazine – June 2018 Edition
                         Copyright © 2018, Cyber Defense Magazine,  All rights reserved worldwide.
   1   2   3   4   5   6   7