Page 2 - CDM-CYBER-DEFENSE-eMAGAZINE-December-2018
P. 2

CONTENTS




            What’s Your Secret – Best Practices for Managing Digital Authentication Credentials .................................... 18

            4 Reasons Why Vpns are More Than Just Security Apps ................................................................................. 21

            Big Data and Cyber Attacks: The Cyber Dragon Awakening ............................................................................ 25

            What is PII and Why Criminals Want Yours .................................................................................................... 32


            New Data Affirms Cyber Threat for Industrial Control Systems ....................................................................... 36

            How Organizations are Tackling Cyber Challenges: Takeaways from the Cybersecurity Imperative ................ 39

            Ransomware and Cyber Attacks Dive in 2018 ................................................................................................. 41

            5 Reasons CISO’s Fail ...................................................................................................................................... 44

            The Internet of Things Predictions for 2019 .................................................................................................... 48


            Cyber Resilience: The Real Battle is Behind the Frontline ............................................................................... 51

            Why is It a Bad Idea to Download Apps from Third Parties? ........................................................................... 54

            Two Decades Later, SIEM Technology Finally Delivers on Its Original Promise ................................................ 58

            Do I Need to Be GDPR Compliant ................................................................................................................... 61

            Top 10 Tricks to Avoid Malware ..................................................................................................................... 65


            Why is Cybercrime a Big Threat In IoT Era? ..................................................................................................... 74

            Is Building a Shark-Cage Right for Global Business? ........................................................................................ 79

            Your Security Auditing is Failing You, and Here’s Why .................................................................................... 82

            Being Compliant Isn’t Secure Enough for Critical Infrastructure ...................................................................... 84

            Leading The Way in Discussions for National Privacy Laws ............................................................................. 88

            How Businesses Can Avoid S3 Bucket Leaks to Protect Company and Client Data ........................................... 91

            Passwords and Honeywords .......................................................................................................................... 95


            Another Cyber Security Month is Over: So What's New? ................................................................................ 99

            2/3 Of Fortune 50 Companies are at Risk of Being Taken off the Internet – Is Your Company Too? ................ 102






                                 2
   1   2   3   4   5   6   7