Page 2 - Cyber Defense eMagazine - June 2018
P. 2
CONTENTS
How GDPR costs could widen the gap between small and large businesses ........ 12
On the Clock .............................................................................................................................. 15
5 Things Everyone Needs to Know About Cybersecurity............................................. 20
Should Hacking Course Be A Part Of University Curriculum ...................................... 23
Protect your business with layers of defense.................................................................. 27
How Deception Technology Helps CIOs Meet the Challenges of Cyber security .. 30
How to Ensure Shared Responsibility for Internet Security ........................................ 35
The Impact of Usability on Phishing ................................................................................... 37
One in Five Android Apps Have Numerous Known Security Flaws .......................... 44
How Artificial Intelligence based Machine Learning will Affect IT Security............. 47
Being Prepared to Keep Your E-commerce Store's Data Safe .................................... 49
Synthetic Identity Fraud and Social Engineering are Growing Concerns and on
the Rise ....................................................................................................................................... 52
Warning Signs For Managing Cyber Security .................................................................. 54
IoT Environment compromising Cyber Security ............................................................. 58
Are We Solving The Right Problem? .................................................................................. 63
Shine a Light on App Security.............................................................................................. 67
Could cryptocurrencies be a better and more effective way of the society's
control?....................................................................................................................................... 69
How to get prepared to cope with the deep reforms of a community? ..................... 71
Virtual Private Networks: Checking, tracking and breaking ........................................ 73
SECURING YOUR CODE FOR GDPR COMPLIANCE ...................................................... 75
Wake-up Call for Enterprise Resource Planning Users................................................. 85
Deception Technology—Useful Tool or Just More Busywork? .................................. 88
DDoS Attack Evolution: The Power of UDP Amplification ........................................... 91
Wake-up Call for ERP Users ................................................................................................. 97
2 Cyber Defense eMagazine – June 2018 Edition
Copyright © 2018, Cyber Defense Magazine, All rights reserved worldwide.