• 👉 Book a Cybersecurity ASSESSMENT 🗓️
Rhyno Cybersecurity
  • NEWS & BLOGS
    • Managed Detection and Response
    • Security Audits & Penetration Testing
    • Cybersecurity Awareness Training
    • Secure Cloud Hosting
    • Emergency Security Response and Forensics
    • Risk Management & GRC
  • VIDEOS & PODCASTS
  • Resources
    • The Definite Blueprint for Cybersecurity in Manufacturing-old
    • Penetration Testing Guide
    • CIS Critical Security Controls Template
    • Security Incident Response Plan Template
    • Cybersecurity Status Self-Assessment
  • NEWSLETTER
  • VIDEO LIBRARY
    • Rhyno Videos
      • Rhyno kids
      • Promotional videos
      • Cybersecurity awareness
      • Protect with passion
      • Rhyno Podcast
      • Did you know?
      • The Jhonson family
    • Cybersecurity classes
      • About phishing attacks
      • Kali linux tutorials
      • Offensive ethical hacking tutorials
      • Defensive blue team tutorials
      • Hack the box walkthroughs
      • Danny boy AI cybersecurity tutorials
      • Podcasts
  • Request a Demo
  • 👉 Book a Cybersecurity ASSESSMENT 🗓️

Dan Duran

With over 14 years of experience in the information security industry, Dan Duran currently leads product development and cyber security strategy for Rhyno Cybersecurity. He’s also a sought-out expert for leadership and knowledge on information security, incident response and cyber security best practices.

Dan holds a Master of Business Administration degree from the University of Illinois, Champaign-Urbana, a Bachelor of Economics degree from Wilfrid Laurier University, and post-graduate specializations in Information Systems Security and Agile Software Product Management. Dan is currently pursuing a Master of Science in Cyber Security at the Georgia Institute of Technology.

During his tenure at Rhyno, Dan has played a fundamental role in the continuous development of the company’s 24/7 Security Operations Center and Managed Detection and Response technology.

Author's Articles

Digital Transformation

Cybersecurity News

Accelerate Your Digital Transformation with Security

Kuppingercole Report

Cybersecurity News

Leadership Compass of Access Management and Federation

zero trust

Cybersecurity News

When Implementing Zero Trust, Context Is Everything

Insider Threats

Cybersecurity News

What Are Insider Threats and How Can You Mitigate Them?

Darknet Cybersecurity

Cybersecurity News

Darknet Cybersecurity: How Finance Institutions Can Defend Themselves

Rhyno Content

Cybersecurity News

3 Ways to Supercharge Identity Authentication and Access Management

Cybersecurity Tips

Cybersecurity News

52 Key Cybersecurity Tips: Your Playbook for Unrivaled Security

Encryption Data Security

Cybersecurity News

How Employing Encryption for Data Security Changed History

Cyber Security

Cybersecurity News

Cyber Security Awareness Tips

Pentesting toolbox

Security Audits & Penetration Testing

24 Essential Penetration Testing Tools

Managed Penetration Testing

Cybersecurity News

Ad Hoc or Managed Penetration Testing: Which One Is Best for You?

Remote Workers

Cybersecurity News

The Modern Workplace: Keeping Remote Workers Productive and Secure

Multicloud Environment

Cybersecurity News

Securing Data in a Multicloud Environment

deep learning

Cybersecurity News

Why Adversarial Examples Are Such a Dangerous Threat to AI Deep Learning

DDOS Attacks

Cybersecurity News

DDoS Attacks Increase in Size, Frequency and Duration

Cyber Resilience

Cybersecurity News

Build a Roadmap for Cyber Resilience

Breach Report

Cybersecurity News

What’s New in the 2020 Cost of a Data Breach Report

Vulnerability Management Hybrid Multicloud

Cybersecurity News

New Ponemon Report: New Ponemon Report: A Programmatic Approach to Vulnerability Management for Hybrid Multicloud

Cyberthreats to gaming companies

Cybersecurity News

Player vs. Hacker: Cyberthreats to Gaming Companies and Gamers

Protect critical assets

Cybersecurity News

Protect Your Critical Assets in a Landscape of Expanding Attack Surfaces

Zero spam, just good stuff

A weekly newsletter delivered straight to your inbox

Sign Up Now!

© 2024 Rhyno Cybersecurity. All rights reserved. Privacy Policy | Terms of Use

Made with in Kitchener-Waterloo, Ontario.

Privacy Preference Center

Privacy Preferences