Page 2 - Cyber Defense eMagazine for January 2019
P. 2
CONTENTS
3 Ways to Combat (Growing) Cyber Threat ....................................................................................... 17
The 5 Most Cringe-Worthy Privileged Data Breaches of 2018 ............................................................ 20
Cyber Attack Targets & Outcomes to Watch Out for in 2019 ............................................................. 25
Best Practices for Data Protection ..................................................................................................... 29
December Patch Tuesday .................................................................................................................. 31
Could Censys serve as a threat intelligence collector? ....................................................................... 33
Can Endpoint Isolation Finally Thwart Cyber attackers? .................................................................... 36
Application Isolation and Control – A Modern Defense for New Threats ........................................... 39
Three Common Security Mistakes and Best Practices to Eliminate Them in the New Year ................ 42
Strength through Simplification: Taming Cybersecurity Complexity in 2019 ...................................... 45
Cybersecurity for Kids ....................................................................................................................... 48
The Challenge of Real-Time Cyber Protection .................................................................................... 52
How to Be Smarter About Biometrics ................................................................................................ 55
Technology Takeover: How to Secure IoT Environments ................................................................... 61
The Solution to Cyber Workforce Shortfalls ...................................................................................... 63
2