• 👉 Book a Cybersecurity ASSESSMENT 🗓️
Rhyno Cybersecurity
  • NEWS & BLOGS
    • Managed Detection and Response
    • Security Audits & Penetration Testing
    • Cybersecurity Awareness Training
    • Secure Cloud Hosting
    • Emergency Security Response and Forensics
    • Risk Management & GRC
  • VIDEOS & PODCASTS
  • Resources
    • The Definite Blueprint for Cybersecurity in Manufacturing-old
    • Penetration Testing Guide
    • CIS Critical Security Controls Template
    • Security Incident Response Plan Template
    • Cybersecurity Status Self-Assessment
  • NEWSLETTER
  • VIDEO LIBRARY
    • Rhyno Videos
      • Rhyno kids
      • Promotional videos
      • Cybersecurity awareness
      • Protect with passion
      • Rhyno Podcast
      • Did you know?
      • The Jhonson family
    • Cybersecurity classes
      • About phishing attacks
      • Kali linux tutorials
      • Offensive ethical hacking tutorials
      • Defensive blue team tutorials
      • Hack the box walkthroughs
      • Danny boy AI cybersecurity tutorials
      • Podcasts
  • Request a Demo
  • 👉 Book a Cybersecurity ASSESSMENT 🗓️

Dan Duran

With over 14 years of experience in the information security industry, Dan Duran currently leads product development and cyber security strategy for Rhyno Cybersecurity. He’s also a sought-out expert for leadership and knowledge on information security, incident response and cyber security best practices.

Dan holds a Master of Business Administration degree from the University of Illinois, Champaign-Urbana, a Bachelor of Economics degree from Wilfrid Laurier University, and post-graduate specializations in Information Systems Security and Agile Software Product Management. Dan is currently pursuing a Master of Science in Cyber Security at the Georgia Institute of Technology.

During his tenure at Rhyno, Dan has played a fundamental role in the continuous development of the company’s 24/7 Security Operations Center and Managed Detection and Response technology.

Author's Articles

Rhyno Cybersecurity Content

Cybersecurity News

8 Steps to Protect your Website

Employees and Operations Safe

Cybersecurity News

Six Tips for Keeping Your Employees and Operations Safe

Understanding Fake Sextortion Email Scams | Rhyno Cybersecurity

Cybersecurity News

Understanding Fake Sextortion Email Scams

Phishing

Cybersecurity News

Phishing: The Cyber-Scam That Can Take Everything Away From You

internet scams

Cybersecurity News

The Most Common Internet Scams you Can’t Help but Spot

Preventing Cyberattacks

Cybersecurity News

Why are Secure Passwords and Authentication Tools Necessary

security and cybercrime

Cybersecurity News

Cybersecurity and cyber resilience – security and cybercrime

Tips for Cybersecurity

Cybersecurity News

Top 10 Most Common Types of Cyber Attacks

Cybersecurity Tools

Cybersecurity News

27 Top Cybersecurity Tools for 2020

Ways to Prevent Cyber Attacks

Cybersecurity News

10 Ways to Prevent Cyber Attacks

Cybersecurity News

How To Identify A Cyber Attack and 25 Things You Can Do To Recover

Online Privacy

Cybersecurity News

15 Alarming Cyber Security Facts and Stats

Tips for Cybersecurity

Cybersecurity News

Data Privacy vs. Data Security [definitions and comparisons]

Data Privacy

Cybersecurity News

Data Privacy: What You Need to Know and How to Get Started

Tips for Cybersecurity

Cybersecurity News

Tips for Cybersecurity in the Workplace

Protect Your Personal Data

Cybersecurity News

8 Smart Ways to Protect Your Personal Data

Common Security Breaches

Cybersecurity News

Common Security Breaches You Need to Be Aware Of

types of Firewall Architecture

Cybersecurity News

Types of Firewall Architecture

Canada Day Flag

Cybersecurity News

10 Fun Facts About Canada Day

secure password

Cybersecurity News

Secure Passwords |52% of users reuse their passwords

Zero spam, just good stuff

A weekly newsletter delivered straight to your inbox

Sign Up Now!

© 2024 Rhyno Cybersecurity. All rights reserved. Privacy Policy | Terms of Use

Made with in Kitchener-Waterloo, Ontario.

Privacy Preference Center

Privacy Preferences