• 👉 Book a Cybersecurity ASSESSMENT 🗓️
Rhyno Cybersecurity
  • NEWS & BLOGS
    • Managed Detection and Response
    • Security Audits & Penetration Testing
    • Cybersecurity Awareness Training
    • Secure Cloud Hosting
    • Emergency Security Response and Forensics
    • Risk Management & GRC
  • VIDEOS & PODCASTS
  • Resources
    • The Definite Blueprint for Cybersecurity in Manufacturing-old
    • Penetration Testing Guide
    • CIS Critical Security Controls Template
    • Security Incident Response Plan Template
    • Cybersecurity Status Self-Assessment
  • NEWSLETTER
  • VIDEO LIBRARY
    • Rhyno Videos
      • Rhyno kids
      • Promotional videos
      • Cybersecurity awareness
      • Protect with passion
      • Rhyno Podcast
      • Did you know?
      • The Jhonson family
    • Cybersecurity classes
      • About phishing attacks
      • Kali linux tutorials
      • Offensive ethical hacking tutorials
      • Defensive blue team tutorials
      • Hack the box walkthroughs
      • Danny boy AI cybersecurity tutorials
      • Podcasts
  • Request a Demo
  • 👉 Book a Cybersecurity ASSESSMENT 🗓️

Dan Duran

With over 14 years of experience in the information security industry, Dan Duran currently leads product development and cyber security strategy for Rhyno Cybersecurity. He’s also a sought-out expert for leadership and knowledge on information security, incident response and cyber security best practices.

Dan holds a Master of Business Administration degree from the University of Illinois, Champaign-Urbana, a Bachelor of Economics degree from Wilfrid Laurier University, and post-graduate specializations in Information Systems Security and Agile Software Product Management. Dan is currently pursuing a Master of Science in Cyber Security at the Georgia Institute of Technology.

During his tenure at Rhyno, Dan has played a fundamental role in the continuous development of the company’s 24/7 Security Operations Center and Managed Detection and Response technology.

Author's Articles

White Hat Hacker

Cybersecurity News

What are White Hat Hackers?

Online Privacy

Cybersecurity News

Steps for Safe Computing and Online Privacy

How To Create Secure Passwords

Cybersecurity News

How To Create Secure Passwords You Won’t Forget

Cybersecurity Tips

Cybersecurity News

Cybersecurity Tips to Keep Your Data Safe While Traveling

Application security

Cybersecurity News

Tips to lift your application security game

internet scams

Cybersecurity News

Top 10 online scams: Watch out for these common red flags

Preventing Cyberattacks

Cybersecurity News

2020 Best Cybersecurity Certifications

Preventing Cyberattacks

Cybersecurity News

6 Steps for Preventing Cyberattacks

coronavirus message

Cybersecurity News

Corona Virus (COVID-19): Staying Strong, Staying Connected

Data Cybersecurity

Cybersecurity News

Enterprise Data Cybersecurity

Implementing cybersecurity

Cybersecurity News

Implementing cybersecurity at the beginning – Not at the end!

Zero Trust

Cybersecurity News

Zero Trust Cybersecurity Predicted to Evolve

Supply Chain Attacks

Cybersecurity News

Increases in Supply Chain Attacks Predicted

Internet of Things

Cybersecurity News

Internet of Things: Its Impact on Cybersecurity

High-Speed Secure Hosting

Secure Cloud Hosting

High-Speed Secure Hosting: Fully-Managed and Secure for Agencies

Protect Your Business

Cybersecurity News

How to Protect Your Business When Selling Online in 2020

Cybersecurity tips for Holidays

Cybersecurity News

Top 10 Cybersecurity Tips for the Holidays Season

Cybersecurity Awareness

Cybersecurity News

Holiday Season Cybersecurity Awareness

Cybersecurity Attacks

Cybersecurity News

Cybersecurity Attacks Can Happen Everywhere

protect your personal info

Cybersecurity News

How to protect your personal info from hackers on your Mac

Zero spam, just good stuff

A weekly newsletter delivered straight to your inbox

Sign Up Now!

© 2024 Rhyno Cybersecurity. All rights reserved. Privacy Policy | Terms of Use

Made with in Kitchener-Waterloo, Ontario.

Privacy Preference Center

Privacy Preferences