• 👉 Book a Cybersecurity ASSESSMENT 🗓️
Rhyno Cybersecurity
  • NEWS & BLOGS
    • Managed Detection and Response
    • Security Audits & Penetration Testing
    • Cybersecurity Awareness Training
    • Secure Cloud Hosting
    • Emergency Security Response and Forensics
    • Risk Management & GRC
  • VIDEOS & PODCASTS
  • Resources
    • The Definite Blueprint for Cybersecurity in Manufacturing-old
    • Penetration Testing Guide
    • CIS Critical Security Controls Template
    • Security Incident Response Plan Template
    • Cybersecurity Status Self-Assessment
  • NEWSLETTER
  • VIDEO LIBRARY
    • Rhyno Videos
      • Rhyno kids
      • Promotional videos
      • Cybersecurity awareness
      • Protect with passion
      • Rhyno Podcast
      • Did you know?
      • The Jhonson family
    • Cybersecurity classes
      • About phishing attacks
      • Kali linux tutorials
      • Offensive ethical hacking tutorials
      • Defensive blue team tutorials
      • Hack the box walkthroughs
      • Danny boy AI cybersecurity tutorials
      • Podcasts
  • Request a Demo
  • 👉 Book a Cybersecurity ASSESSMENT 🗓️

Dan Duran

With over 14 years of experience in the information security industry, Dan Duran currently leads product development and cyber security strategy for Rhyno Cybersecurity. He’s also a sought-out expert for leadership and knowledge on information security, incident response and cyber security best practices.

Dan holds a Master of Business Administration degree from the University of Illinois, Champaign-Urbana, a Bachelor of Economics degree from Wilfrid Laurier University, and post-graduate specializations in Information Systems Security and Agile Software Product Management. Dan is currently pursuing a Master of Science in Cyber Security at the Georgia Institute of Technology.

During his tenure at Rhyno, Dan has played a fundamental role in the continuous development of the company’s 24/7 Security Operations Center and Managed Detection and Response technology.

Author's Articles

Cyber Security Tips

Cybersecurity News

10 Cyber Security Tips and Resources for Small Business

SOC Cyber Security Analyst

Cybersecurity News

A Day in the Life of a SOC Cyber Security Analyst

CEO Fraud Attacks

Cybersecurity News

CEO Fraud Attacks | 4 Most Common cases & how to Avoid Them

Security Testing

Cybersecurity News

Security Testing in Your Development QA – Three Reasons Why

Awareness vs Resilience

Cybersecurity News

Awareness vs Resilience | Closing the Cybersecurity Gap

Website Backups

Cybersecurity News

What You Need to Know About Website Backups

Penetration Testing

Cybersecurity News

Penetration Testing: Black-Box vs Grey-Box vs White-Box

Apple's new updates

Cybersecurity News

Apple’s new updates cover dozens of vulnerabilities.

Social Media Identity Theft

Cybersecurity News

Social Media Identity Theft | How to Protect Yourself

Dangers of Free Web Hosting

Secure Cloud Hosting

Dangers of Free Web Hosting for Your Manufacturing Company

Web Penetration Testing

Cybersecurity News

Web Penetration Testing: How Does It Work?

MDR vs. MSSP

Cybersecurity News

MDR vs. MSSP Security Services: Know the Difference

Using Free VPN

Cybersecurity News

Using Free VPN | 5 Reasons to Avoid it

Cloud Hosting

Secure Cloud Hosting

Cloud Hosting vs VPS vs Dedicated: Know the Differences

Bug Bounty

Security Audits & Penetration Testing

Bug Bounty vs Penetration Test: Know the Difference

What is Shadow IT

Cybersecurity News

What is Shadow IT and Why is It so Dangerous?

NIST Incident Response Plan

Cybersecurity News

NIST Incident Response Plan: Steps and Template

Black Basta Ransomware

Cybersecurity News

Black Basta​ Ransomware Emerging Threat out in the wild, Cyber Security Experts Warn

Google Password Manager

Cybersecurity News

Google Password Manager Enhances the Security Across all its Platforms

ZuoRat

Cybersecurity News

Small Office/Home Office Routers taken over by ZuoRAT, a Malware that Spies on Networks

Zero spam, just good stuff

A weekly newsletter delivered straight to your inbox

Sign Up Now!

© 2024 Rhyno Cybersecurity. All rights reserved. Privacy Policy | Terms of Use

Made with in Kitchener-Waterloo, Ontario.

Privacy Preference Center

Privacy Preferences