Page 2 - Cyber Defense eMagazine - May 2018
P. 2

CONTENTS






               CISOs Toughest Battle:  Finding the Right Weapons to Fight the Last One Percent of Threats .......... 5

               Synthetic Identity Fraud and Social Engineering are Growing Concerns and on the Rise .................. 10
               Cloud Direct Connects: The Best Bet for Cyber Security .......................................................................... 15

               The case study: Cyber camouflage scenario .............................................................................................. 20

               5 Things Everyone Needs to Know About Cybersecurity ......................................................................... 23

               Reduced SWaP Will Usher in Beyond Line of Sight (BLOS) Era for Class III UAVs .............................. 28
               What can we learn about Cyber from the flu? ............................................................................................. 32

               On the Clock ..................................................................................................................................................... 35

               Don’t Leave Vulnerability Management to Chance ..................................................................................... 42
               The Ghost in the Machine (Learning) ............................................................................................................ 46

               Regulating Against a Data Breach ................................................................................................................ 49

               3 Emerging Technologies Impacting Cyber Security ................................................................................. 55

               5 Things the Trump Administration Got Right on Cybersecurity ............................................................. 59
               Key Considerations for Identity Governance in the Cloud ........................................................................ 65

               Mobile Apps Loaded with Holes Like Swiss Cheese .................................................................................. 70

               Data Security in the Digital Era ...................................................................................................................... 74

               Nation State Attacks Continue Unimpeded; So Why Haven’t We Stopped Them? ............................... 78
               New to Cyber Security Risk Management? Start by answering these questions… .............................. 80

               The Seven Stages of GDPR Compliance ...................................................................................................... 84

               Some of the world’s biggest crimes go unnoticed, until it’s too late ...................................................... 88
               Georgia’s Little Secret Cybersecurity Hub: Enter Augusta… ................................................................... 92

               Free Monthly Cyber Defense eMagazine Via Email .................................................................................... 98

               Marketing and Partnership Opportunities .................................................................................................... 99

               Job Opportunities ............................................................................................................................................ 99
               Announcing Winners of the InfoSec Awards 2018 ................................................................................... 100





                     2   Cyber Defense eMagazine – May 2018 Edition
                         Copyright © 2018, Cyber Defense Magazine,  All rights reserved worldwide.
   1   2   3   4   5   6   7