• 👉 Book a Cybersecurity ASSESSMENT 🗓️
Rhyno Cybersecurity
  • NEWS & BLOGS
    • Managed Detection and Response
    • Security Audits & Penetration Testing
    • Cybersecurity Awareness Training
    • Secure Cloud Hosting
    • Emergency Security Response and Forensics
    • Risk Management & GRC
  • VIDEOS & PODCASTS
  • Resources
    • The Definite Blueprint for Cybersecurity in Manufacturing-old
    • Penetration Testing Guide
    • CIS Critical Security Controls Template
    • Security Incident Response Plan Template
    • Cybersecurity Status Self-Assessment
  • NEWSLETTER
  • VIDEO LIBRARY
    • Rhyno Videos
      • Rhyno kids
      • Promotional videos
      • Cybersecurity awareness
      • Protect with passion
      • Rhyno Podcast
      • Did you know?
      • The Jhonson family
    • Cybersecurity classes
      • About phishing attacks
      • Kali linux tutorials
      • Offensive ethical hacking tutorials
      • Defensive blue team tutorials
      • Hack the box walkthroughs
      • Danny boy AI cybersecurity tutorials
      • Podcasts
  • Request a Demo
  • 👉 Book a Cybersecurity ASSESSMENT 🗓️

Dan Duran

With over 14 years of experience in the information security industry, Dan Duran currently leads product development and cyber security strategy for Rhyno Cybersecurity. He’s also a sought-out expert for leadership and knowledge on information security, incident response and cyber security best practices.

Dan holds a Master of Business Administration degree from the University of Illinois, Champaign-Urbana, a Bachelor of Economics degree from Wilfrid Laurier University, and post-graduate specializations in Information Systems Security and Agile Software Product Management. Dan is currently pursuing a Master of Science in Cyber Security at the Georgia Institute of Technology.

During his tenure at Rhyno, Dan has played a fundamental role in the continuous development of the company’s 24/7 Security Operations Center and Managed Detection and Response technology.

Author's Articles

Cybersecurity News

AVERAGE RANSOM PAYMENT HAS GONE UP TO 71% IN 2022

Videos & Podcasts

Ch-1. Introduction to Cyber Security for Small and Medium Businesses

What is data retention and why is it important?

Cybersecurity News

What is data retention and why is it important?

Cybersecurity News

5 Tips for Measuring Your Company’s Security

Log4J Vulnerability

Cybersecurity News

The Log4j Vulnerability is Not Over Yet – Microsoft Reports More CVEs

cryptojacking Attacks and Cybersecurity Services

Cybersecurity News

Cryptojacking: an Insidious Threat that goes Beyond Virtual Currencies

Videos & Podcasts

Manufacturing Cybersecurity Best Practices

Videos & PodcastsSecurity Audits & Penetration TestingKali Linux Tutorials

DDoS Course for Ethical Hackers & Pentesters – Theory, Setup & DEFENSE!

Tutorials & WebinarsSecurity Audits & Penetration Testing

BEST WordPress Website Lab Setup for Pentesting! – Virtual Box, Debian 10, and Kali Linux

Tutorials & Webinars

Learn to Install Kali Linux on Macbook, MacOS using Virtual Box

Pentesting

Videos & Podcasts

A Complete Penetration Testing Guide With Sample Test Cases – Download

Tutorials & WebinarsPodcasts!

S1E15 – Remote Work & Cybersecurity: 10 Tips to Protect Your Home Network

Cybersecurity Services - The 10 Best Cybersecurity Tips for Employees Working Remotely

Cybersecurity News

Cybersecurity Solutions – The 10 Best Tips for Employees Working Remotely

Tutorials & WebinarsPodcasts!

S1E14 – Staff Augmentation 101: Get the DevOps Expertise You Need

Cybersecurity Awareness Month

Cybersecurity News

Cybersecurity Awareness Month 2021 – Week 2: Sharing Special Moments

Tutorials & Webinars

S1E13 – Password Management done Right with LastPass…|

Tutorials & Webinars

Installing Metasploitable 2 on VirtualBox 6.1

Cybersecurity Awareness Month 2021

Cybersecurity News

Cybersecurity Awareness Month 2021

Tutorials & Webinars

Installing OpenVAS GVM on KALI Linux the right way!

7 Signs that a Company is being Attacked with Ransomware

Cybersecurity News

7 Signs that a Company is the Target of Ransomware – Cybersecurity from the Trenches

Zero spam, just good stuff

A weekly newsletter delivered straight to your inbox

Sign Up Now!

© 2024 Rhyno Cybersecurity. All rights reserved. Privacy Policy | Terms of Use

Made with in Kitchener-Waterloo, Ontario.

Privacy Preference Center

Privacy Preferences