Page 2 - CDM-CYBER-DEFENSE-eMAGAZINE-December-2018
P. 2
CONTENTS
What’s Your Secret – Best Practices for Managing Digital Authentication Credentials .................................... 18
4 Reasons Why Vpns are More Than Just Security Apps ................................................................................. 21
Big Data and Cyber Attacks: The Cyber Dragon Awakening ............................................................................ 25
What is PII and Why Criminals Want Yours .................................................................................................... 32
New Data Affirms Cyber Threat for Industrial Control Systems ....................................................................... 36
How Organizations are Tackling Cyber Challenges: Takeaways from the Cybersecurity Imperative ................ 39
Ransomware and Cyber Attacks Dive in 2018 ................................................................................................. 41
5 Reasons CISO’s Fail ...................................................................................................................................... 44
The Internet of Things Predictions for 2019 .................................................................................................... 48
Cyber Resilience: The Real Battle is Behind the Frontline ............................................................................... 51
Why is It a Bad Idea to Download Apps from Third Parties? ........................................................................... 54
Two Decades Later, SIEM Technology Finally Delivers on Its Original Promise ................................................ 58
Do I Need to Be GDPR Compliant ................................................................................................................... 61
Top 10 Tricks to Avoid Malware ..................................................................................................................... 65
Why is Cybercrime a Big Threat In IoT Era? ..................................................................................................... 74
Is Building a Shark-Cage Right for Global Business? ........................................................................................ 79
Your Security Auditing is Failing You, and Here’s Why .................................................................................... 82
Being Compliant Isn’t Secure Enough for Critical Infrastructure ...................................................................... 84
Leading The Way in Discussions for National Privacy Laws ............................................................................. 88
How Businesses Can Avoid S3 Bucket Leaks to Protect Company and Client Data ........................................... 91
Passwords and Honeywords .......................................................................................................................... 95
Another Cyber Security Month is Over: So What's New? ................................................................................ 99
2/3 Of Fortune 50 Companies are at Risk of Being Taken off the Internet – Is Your Company Too? ................ 102
2