• 👉 Book a Cybersecurity ASSESSMENT 🗓️
Rhyno Cybersecurity
  • NEWS & BLOGS
    • Managed Detection and Response
    • Security Audits & Penetration Testing
    • Cybersecurity Awareness Training
    • Secure Cloud Hosting
    • Emergency Security Response and Forensics
    • Risk Management & GRC
  • VIDEOS & PODCASTS
  • Resources
    • The Definite Blueprint for Cybersecurity in Manufacturing-old
    • Penetration Testing Guide
    • CIS Critical Security Controls Template
    • Security Incident Response Plan Template
    • Cybersecurity Status Self-Assessment
  • NEWSLETTER
  • VIDEO LIBRARY
    • Rhyno Videos
      • Rhyno kids
      • Promotional videos
      • Cybersecurity awareness
      • Protect with passion
      • Rhyno Podcast
      • Did you know?
      • The Jhonson family
    • Cybersecurity classes
      • About phishing attacks
      • Kali linux tutorials
      • Offensive ethical hacking tutorials
      • Defensive blue team tutorials
      • Hack the box walkthroughs
      • Danny boy AI cybersecurity tutorials
      • Podcasts
  • Request a Demo
  • 👉 Book a Cybersecurity ASSESSMENT 🗓️

Dan Duran

With over 14 years of experience in the information security industry, Dan Duran currently leads product development and cyber security strategy for Rhyno Cybersecurity. He’s also a sought-out expert for leadership and knowledge on information security, incident response and cyber security best practices.

Dan holds a Master of Business Administration degree from the University of Illinois, Champaign-Urbana, a Bachelor of Economics degree from Wilfrid Laurier University, and post-graduate specializations in Information Systems Security and Agile Software Product Management. Dan is currently pursuing a Master of Science in Cyber Security at the Georgia Institute of Technology.

During his tenure at Rhyno, Dan has played a fundamental role in the continuous development of the company’s 24/7 Security Operations Center and Managed Detection and Response technology.

Author's Articles

Tutorials & Webinars

Cybersecurity Threats, Malware, Trends, and Strategies

Tutorials & Webinars

Zero-Day Email Phishing Attacks

Tutorials & Webinars

Top 5 Cybersecurity Tips for Every Small Business

Tutorials & Webinars

Secure a Career in Cybersecurity, NOW!

Videos & PodcastsSecurity Audits & Penetration Testing

Why penetration testing is so important

MDR Solutions

Cybersecurity News

MDR Solutions

Insider threats

Cybersecurity News

Types of insider threats

Password Theft

Cybersecurity News

Password Theft | Have you been hacked?

Cybersecurity Myths

Cybersecurity News

Cybersecurity Myths | Threat Actors Use Sophisticated Tools

What is OpenVas?

Cybersecurity News

What is OpenVas? | Vulnerability Assessment

Cybersecurity Investment

Cybersecurity News

Cybersecurity Investment: Why it is more than important

Penetration Testing Vs Vulnerability Assessment

Cybersecurity News

Penetration Testing Vs Vulnerability Assessment

Difference between Penetration Testing & Vulnerability Assessment

Cybersecurity News

Difference between Penetration Testing & Vulnerability Assessment

Cybersecurity News

What is Zero Trust? | Rhyno Cybersecurity

Malware Attacks

Cybersecurity News

Malware Attacks | Rhyno Cybersecurity

Secure Your Industrial Control Stacks

Cybersecurity News

Secure Your Industrial Control Stacks, Now!

What is OpenVAS?

Cybersecurity News

Rhyno GUARD MDR | Reporting and Compliance

What is OpenVAS?

Cybersecurity News

Network Vulnerability Assessment | What is OpenVas?

Penetration Testing methodologies

Cybersecurity News

Penetration Testing methodologies

Website Application Security Audits

Cybersecurity News

Tests performed in our Website Application Security Audits

Zero spam, just good stuff

A weekly newsletter delivered straight to your inbox

Sign Up Now!

© 2024 Rhyno Cybersecurity. All rights reserved. Privacy Policy | Terms of Use

Made with in Kitchener-Waterloo, Ontario.

Privacy Preference Center

Privacy Preferences