Page 3 - CDM-CYBER-DEFENSE-eMAGAZINE-December-2018
P. 3

7 Network Security Tools to Protect Your Digital Assets from Malicious Activity ........................................... 104

            Faxploit: Critical Flaws in The Fax Protocol? Not So Fast… ............................................................................. 108


            Brands Beware! Strengthen Data Privacy or Pay a Hefty Price ....................................................................... 111

            Deception Technology for Active Defense: Changing the Game on Attackers ................................................ 114

            Six Essential Questions About “ePrivacy” ...................................................................................................... 119

            A New Approach to Secure Mobile Banking Apps .......................................................................................... 122

            Streamlining RMF Accreditation to Speed Deployment of New Defense Technologies .................................. 125


            Why Zero Trust is The Answer to Securing Healthcare Data........................................................................... 129

            The Modern Business Has No Perimeter ....................................................................................................... 132

            A CISOs ‘playbook’: Practice How You Fight .................................................................................................. 135

            AI and Machine Learning Must Be Used Strategically in Cybersecurity .......................................................... 138

            Data Security Tops 2019’s Intelligent Workplace Priorities ............................................................................ 141

            Watchguard Technologies 2019 Security Predictions ..................................................................................... 144


            If I Use The Word Recidivists, Will They Come? ............................................................................................. 150

            Regent University’s Institute for Cybersecurity ............................................................................................. 154

            Cryptographic Key Management Considerations for Secure Cloud Computing ............................................... 157

            The Only Counter Strategy Against Data Loss: Reliable Backup Methodology ................................................ 160

            Revisiting Conficker 10 Years Later ................................................................................................................ 163






















                                 3
   1   2   3   4   5   6   7   8