• 👉 Book a Cybersecurity ASSESSMENT 🗓️
Rhyno Cybersecurity
  • NEWS & BLOGS
    • Managed Detection and Response
    • Security Audits & Penetration Testing
    • Cybersecurity Awareness Training
    • Secure Cloud Hosting
    • Emergency Security Response and Forensics
    • Risk Management & GRC
  • VIDEOS & PODCASTS
  • Resources
    • The Definite Blueprint for Cybersecurity in Manufacturing-old
    • Penetration Testing Guide
    • CIS Critical Security Controls Template
    • Security Incident Response Plan Template
    • Cybersecurity Status Self-Assessment
  • NEWSLETTER
  • VIDEO LIBRARY
    • Rhyno Videos
      • Rhyno kids
      • Promotional videos
      • Cybersecurity awareness
      • Protect with passion
      • Rhyno Podcast
      • Did you know?
      • The Jhonson family
    • Cybersecurity classes
      • About phishing attacks
      • Kali linux tutorials
      • Offensive ethical hacking tutorials
      • Defensive blue team tutorials
      • Hack the box walkthroughs
      • Danny boy AI cybersecurity tutorials
      • Podcasts
  • Request a Demo
  • 👉 Book a Cybersecurity ASSESSMENT 🗓️

Dan Duran

With over 14 years of experience in the information security industry, Dan Duran currently leads product development and cyber security strategy for Rhyno Cybersecurity. He’s also a sought-out expert for leadership and knowledge on information security, incident response and cyber security best practices.

Dan holds a Master of Business Administration degree from the University of Illinois, Champaign-Urbana, a Bachelor of Economics degree from Wilfrid Laurier University, and post-graduate specializations in Information Systems Security and Agile Software Product Management. Dan is currently pursuing a Master of Science in Cyber Security at the Georgia Institute of Technology.

During his tenure at Rhyno, Dan has played a fundamental role in the continuous development of the company’s 24/7 Security Operations Center and Managed Detection and Response technology.

Author's Articles

Uber Completely Pwned By Teenager

Cybersecurity News

Uber Completely Pwned By Teenager – Sources Reveal

Testimony of Peiter Zatko

Cybersecurity News

Senators Enraged by the Testimony of Peiter Zatko, Twitter’s Whistleblower

Microsoft's Most Recent Security Update

Cybersecurity News

Microsoft’s Most Recent Security Update Fixes a Zero-Day and 64 New Flaws

Cisco Issues Security Patches

Cybersecurity News

Cisco Issues Security Patches for New Vulnerabilities Affecting Several Products

Elevate 2022

Cybersecurity News

Rhyno Announces Keynote Presentation at Elevate 2022 – Secure and Protect Stage

JuiceLedger

Cybersecurity News

JuiceLedger hackers are responsible for recent phishing attacks on PyPI users

Critical Security Controls

Cybersecurity News

CIS Critical Security Controls V8: Steps and Template Download

MITRE ATT&CK Framework

Cybersecurity News

A CISO’s Guide to the MITRE ATT&CK Framework

Executive Impersonation Fraud

Cybersecurity News

6 Ways to Avoid C-Level Executive Impersonation Fraud

Sideloading

Cybersecurity News

Sideloading: what is it and how does it work?

Deepfake

Cybersecurity News

Deepfake: What is It and How to Stay Safe?

Security Validation Checklist

Cybersecurity News

10-Step Security Validation Checklist for CISOs

Borat RAT

Cybersecurity News

Borat RAT: A Malicious Package that Combines Remote Access, Spyware, and Ransomware!

Smishing

Cybersecurity News

What You Should Know About Smishing

Phishing Method

Cybersecurity News

Phishing Method for Bypassing MFA Discovered using WebView2

Security Operations Center

Cybersecurity News

What is a Managed Security Operations Center (SOC)?

Culture of Silence in Cyber Security

Cybersecurity News

How to End the Culture of Silence in Cyber Security

Website Hosting Provider

Secure Cloud Hosting

Website Hosting Provider | 7 questions before you buy.

The Last Selfie on Earth

Cybersecurity News

The Last Selfie on Earth – Artificial Intelligence and Cyber Security

Ransomware

Cybersecurity News

This Ransomware Exploits RDP Weaknesses to Get Access to Networks

Zero spam, just good stuff

A weekly newsletter delivered straight to your inbox

Sign Up Now!

© 2024 Rhyno Cybersecurity. All rights reserved. Privacy Policy | Terms of Use

Made with in Kitchener-Waterloo, Ontario.

Privacy Preference Center

Privacy Preferences