Page 3 - Cyber Defense eMagazine - November 2017
P. 3
SECURING THE CONNECTED AND AUTONOMOUS VEHICLE 51
3 STEPS TO CREATE A CULTURE OF CYBERSECURITY 53
THE CRITICAL DIFFERENCES BETWEEN SECURITY ORCHESTRATION AND
INTELLIGENT AUTOMATION 55
BUSINESS EMAIL COMPROMISE (BEC) IN FULL FORCE & EFFECT 59
9 WAYS CEOS CAN PROMOTE CYBERSECURITY 61
MEASURING SUCCESS IN CYBER SECURITY 65
ENHANCE CYBER THREAT HUNTING THROUGH OPTICAL NETWORK ANALYTICS 67
DIGITAL CERTIFICATES 70
A NEW APPROACH TO HARNESSING MACHINE LEARNING FOR SECURITY 73
CYBER RESILIENCE IN 2018: WHAT TO WATCH 76
‘TIS THE SEASON TO PREPARE YOUR E-COMMERCE BUSINESS TO EFFECTIVELY
FIGHT FRAUD 78
BIOMETRIC BEST PRACTICES 80
WHY YOU NEED A GOOD HEAD-HUNTER TO HELP FIGHT CYBER CRIME 82
IDENTITY THEFT RISK MANAGEMENT AND CYBER-SECURITY: CONNECTING THE
DOTS 84
TOP TWENTY INFOSEC OPEN SOURCES 101
JOB OPPORTUNITIES 101
FREE MONTHLY CYBER DEFENSE EMAGAZINE VIA EMAIL 111
3 Cyber Defense eMagazine – November 2017 Edition
Copyright © 2017, Cyber Defense Magazine, All rights reserved worldwide.