Page 2 - Cyber Defense eMagazine September 2018
P. 2
2
CONTENTS
Sponsors............................................................................................. 5
5G – Supporting the Transformation Mobility..................................... 16
Ransomware Finds a Way - Best Practices........................................... 19
Psychological Operations Behind Ransomware Attacks…………………….. 23
Learning from our Oversights…………………………………………………………… 25
Signs That Indicate Your WordPress…………………………………………………. 28
How Automation Can Ensure Speedy………………………………………………. 31
Going Beyond HIPAA Compliance: A Case Study………………………………. 34
The Four Most Serious Threats Facing Online………………...………………… 37
Inadequate Cybersecurity Hurts Where it Counts the Most……………… 39
How SOAR Can Help You Get ………………………………………………………….. 41
5 Common Incident Response Problems…………………………………………. 43
4 Concrete Ways Threat Intelligence Can Make ………………………………. 46
From Theory To Practice: 5 Applications Of Threat Intelligence……….. 49
Cyber Forensics: An Academic Partnership with Pittsburgh………….… 52
Why Smartphone Security Should Grow Beyond Biometrics…………… 55
Rampart de Troika: A Three-Step Process to…………………………………… 58
Malware Basics……………………………………………………………………………… 61
Five GDPR Mistakes that Will Put Your Company in Hot Water………. 63
How Do We Get Privacy?................................................................. 66
Role of Identity and Access……………………………………………………………. 69
Spear-phishing Is The Next…………………………………………………………….. 72
Where do I “Sign”?........................................................................... 75
Events……………………………………………………………………………………………. 78