Page 3 - CDM-CYBER-DEFENSE-eMAGAZINE-December-2018
P. 3
7 Network Security Tools to Protect Your Digital Assets from Malicious Activity ........................................... 104
Faxploit: Critical Flaws in The Fax Protocol? Not So Fast… ............................................................................. 108
Brands Beware! Strengthen Data Privacy or Pay a Hefty Price ....................................................................... 111
Deception Technology for Active Defense: Changing the Game on Attackers ................................................ 114
Six Essential Questions About “ePrivacy” ...................................................................................................... 119
A New Approach to Secure Mobile Banking Apps .......................................................................................... 122
Streamlining RMF Accreditation to Speed Deployment of New Defense Technologies .................................. 125
Why Zero Trust is The Answer to Securing Healthcare Data........................................................................... 129
The Modern Business Has No Perimeter ....................................................................................................... 132
A CISOs ‘playbook’: Practice How You Fight .................................................................................................. 135
AI and Machine Learning Must Be Used Strategically in Cybersecurity .......................................................... 138
Data Security Tops 2019’s Intelligent Workplace Priorities ............................................................................ 141
Watchguard Technologies 2019 Security Predictions ..................................................................................... 144
If I Use The Word Recidivists, Will They Come? ............................................................................................. 150
Regent University’s Institute for Cybersecurity ............................................................................................. 154
Cryptographic Key Management Considerations for Secure Cloud Computing ............................................... 157
The Only Counter Strategy Against Data Loss: Reliable Backup Methodology ................................................ 160
Revisiting Conficker 10 Years Later ................................................................................................................ 163
3