Page 2 - Cyber Defense eMagazine for January 2019
P. 2

CONTENTS





            3 Ways to Combat (Growing) Cyber Threat ....................................................................................... 17

            The 5 Most Cringe-Worthy Privileged Data Breaches of 2018 ............................................................ 20

            Cyber Attack Targets & Outcomes to Watch Out for in 2019 ............................................................. 25


            Best Practices for Data Protection ..................................................................................................... 29

            December Patch Tuesday .................................................................................................................. 31

            Could Censys serve as a threat intelligence collector? ....................................................................... 33


            Can Endpoint Isolation Finally Thwart Cyber attackers? .................................................................... 36

            Application Isolation and Control – A Modern Defense for New Threats ........................................... 39

            Three Common Security Mistakes and Best Practices to Eliminate Them in the New Year ................ 42


            Strength through Simplification: Taming Cybersecurity Complexity in 2019 ...................................... 45

            Cybersecurity for Kids ....................................................................................................................... 48

            The Challenge of Real-Time Cyber Protection .................................................................................... 52


            How to Be Smarter About Biometrics ................................................................................................ 55

            Technology Takeover: How to Secure IoT Environments ................................................................... 61

            The Solution to Cyber Workforce Shortfalls ...................................................................................... 63






















                                                                                                                2
   1   2   3   4   5   6   7