Page 2 - Cyber Defense eMagazine September 2018
P. 2

2




                                                         CONTENTS




                 Sponsors.............................................................................................    5

                 5G – Supporting the Transformation Mobility.....................................       16
                 Ransomware Finds a Way - Best Practices...........................................     19
                 Psychological Operations Behind Ransomware Attacks……………………..                           23

                 Learning from our Oversights……………………………………………………………                                    25
                 Signs That Indicate Your WordPress………………………………………………….                                 28

                 How Automation Can Ensure Speedy……………………………………………….                                    31
                 Going Beyond HIPAA Compliance: A Case Study……………………………….                               34

                 The Four Most Serious Threats Facing Online………………...…………………                            37
                 Inadequate Cybersecurity Hurts Where it Counts the Most………………                          39

                 How SOAR Can Help You Get …………………………………………………………..                                     41
                 5 Common Incident Response Problems………………………………………….                                   43
                 4 Concrete Ways Threat Intelligence Can Make ……………………………….                             46

                 From Theory To Practice: 5 Applications Of Threat Intelligence………..                    49
                 Cyber Forensics:  An Academic Partnership with Pittsburgh………….…                        52

                 Why Smartphone Security Should Grow Beyond Biometrics……………                             55
                 Rampart de Troika: A Three-Step Process to……………………………………                               58

                 Malware Basics………………………………………………………………………………                                           61
                 Five GDPR Mistakes that Will Put Your Company in Hot Water……….                         63

                 How Do We Get Privacy?.................................................................     66
                 Role of Identity and Access…………………………………………………………….                                    69

                 Spear-phishing Is The Next……………………………………………………………..                                    72
                 Where do I “Sign”?...........................................................................     75

                 Events…………………………………………………………………………………………….                                             78
   1   2   3   4   5   6   7