Page 2 - Cyber Defense eMagazine - March 2018
P. 2

CONTENTS







               4 Areas with a Growing Cyber Risk of Digital Extortion ........................................................... 6
               Are your emails safe? ............................................................................................................ 9

               Cyber-attacks thrive the market for Managed Security Services ........................................... 14

               Safer Internet Day 2018: Where You’re Falling Short on Your Online Ad Campaigns. ............ 18

               Security Remains Top Concern for IBM AIX Community ........................................................ 23

               Pentester Syndrome ............................................................................................................ 33

               IMPORTANCE OF “The General Data Protection Regulation” in Cyber Security World ........... 38

               How We Can Secure The Energy Grid and the Smart Home Of The Future ............................. 42
               Cloud Clout & the Chinese agnostic ...................................................................................... 46

               GDPR Privacy Laws: Ramifications and Possible Interdictions for Open Source Security
               Vulnerabilities ..................................................................................................................... 52

               Tech and IT Companies are Driving Cloud Security Investments ............................................ 57

               Don’t Get Caught by Ransomware ....................................................................................... 60

               SSH: The Two-Edged Sword in Your Security Strategy ........................................................... 63

               Third-Party Patching ............................................................................................................ 66

               Ahead of the 2018 US midterms, how can we respond to foreign voting interference? ......... 76
               Attackers on Rampage ........................................................................................................ 82

               Computer Bug History –  Notable pests from the last 30 years .............................................. 86

               Keep hackers from boarding your network with a Cyber No-Fly list ...................................... 89

               Top 5 Ways to Combat Insider Threat .................................................................................. 93

               Top Threats of 2017 – Get Ready 2018, Here We Come ........................................................ 96








                     2   Cyber Defense eMagazine – March 2018 Edition
                         Copyright © 2018, Cyber Defense Magazine,  All rights reserved worldwide.
   1   2   3   4   5   6   7