• 👉 Book a Cybersecurity ASSESSMENT 🗓️
Rhyno Cybersecurity
  • NEWS & BLOGS
    • Managed Detection and Response
    • Security Audits & Penetration Testing
    • Cybersecurity Awareness Training
    • Secure Cloud Hosting
    • Emergency Security Response and Forensics
    • Risk Management & GRC
  • VIDEOS & PODCASTS
  • Resources
    • The Definite Blueprint for Cybersecurity in Manufacturing-old
    • Penetration Testing Guide
    • CIS Critical Security Controls Template
    • Security Incident Response Plan Template
    • Cybersecurity Status Self-Assessment
  • NEWSLETTER
  • VIDEO LIBRARY
    • Rhyno Videos
      • Rhyno kids
      • Promotional videos
      • Cybersecurity awareness
      • Protect with passion
      • Rhyno Podcast
      • Did you know?
      • The Jhonson family
    • Cybersecurity classes
      • About phishing attacks
      • Kali linux tutorials
      • Offensive ethical hacking tutorials
      • Defensive blue team tutorials
      • Hack the box walkthroughs
      • Danny boy AI cybersecurity tutorials
      • Podcasts
  • Request a Demo
  • 👉 Book a Cybersecurity ASSESSMENT 🗓️

Dan Duran

With over 14 years of experience in the information security industry, Dan Duran currently leads product development and cyber security strategy for Rhyno Cybersecurity. He’s also a sought-out expert for leadership and knowledge on information security, incident response and cyber security best practices.

Dan holds a Master of Business Administration degree from the University of Illinois, Champaign-Urbana, a Bachelor of Economics degree from Wilfrid Laurier University, and post-graduate specializations in Information Systems Security and Agile Software Product Management. Dan is currently pursuing a Master of Science in Cyber Security at the Georgia Institute of Technology.

During his tenure at Rhyno, Dan has played a fundamental role in the continuous development of the company’s 24/7 Security Operations Center and Managed Detection and Response technology.

Author's Articles

Dangers of Storing Passwords

Cybersecurity News

The Dangers of Storing Passwords in Your Computer and What to do About It

Sliver C2

Cybersecurity News

Hackers are Moving to Sliver C2 as an Alternative to Cobalt Strike

Microsoft Server Misconfiguration

Cybersecurity News

65,000+ Businesses Suffered Data Leaks Due to Microsoft Server Misconfiguration

New Malicious Clicker

Cybersecurity News

New Malicious “Clicker Apps” Downloaded by over 20M Users

Quantum Computing Age

Cybersecurity News

Diffie Advises Security Professionals to Be Prepared for the Quantum Computing Age

Phishing-as-a-Service

Cybersecurity News

Researchers Issue Warning Regarding New Phishing-as-a-Service Model Used by Cyber Criminals

Penetration Testing

Cybersecurity News

Penetration Testing Process and Guide

Exchange Server vulnerabilities

Cybersecurity News

Microsoft releases enhanced mitigations for unpatched Exchange Server vulnerabilities

Vulnerability on FortiGate

Cybersecurity News

ALERT: Critical Vulnerability on FortiGate and FortiProxy, According to Fortinet

MDR for complete Network Protection

Cybersecurity News

Why companies need EDR & MDR for complete Network Protection

Unpatched Microsoft Exchange Zero-Day

Cybersecurity News

ALERT: Unpatched Microsoft Exchange Zero-Day Actively Exploited

Canadian Society of Iranian Engineers and Architects

Cybersecurity News

Rhyno Cybersecurity Speaking at the Canadian Society of Iranian Engineers and Architects

Optus Data Breach

Cybersecurity News

40% of Australians’​ Personal Information Stolen in Massive Optus Data Breach

Today's Threat Landscape

Cybersecurity News

Continuous Security Testing is a Must in Today’s Threat Landscape

PowerPoint Malware

Cybersecurity News

Hackers Infect Systems with PowerPoint Malware Using Mouseover Trick.

Incident Response Practices

Cybersecurity News

7 Best Incident Response Practices Your Company Should Consider

Network Security Threats

Cybersecurity News

5 Network Security Threats and How to Protect Your Business

Data Breaches

Cybersecurity News

Top 5 Reasons Why Data Breaches Happen

BYOD

Cybersecurity News

7 Point Checklist for Securing BYOD

pen testing methodologies

Cybersecurity News

Top 5 Pen testing methodologies

Zero spam, just good stuff

A weekly newsletter delivered straight to your inbox

Sign Up Now!

© 2024 Rhyno Cybersecurity. All rights reserved. Privacy Policy | Terms of Use

Made with in Kitchener-Waterloo, Ontario.

logo
Web Content ProtectedBy Copyleaks

Privacy Preference Center

Privacy Preferences