• 👉 Book a Cybersecurity ASSESSMENT 🗓️
Rhyno Cybersecurity
  • NEWS & BLOGS
    • Managed Detection and Response
    • Security Audits & Penetration Testing
    • Cybersecurity Awareness Training
    • Secure Cloud Hosting
    • Emergency Security Response and Forensics
    • Risk Management & GRC
  • VIDEOS & PODCASTS
  • Resources
    • The Definite Blueprint for Cybersecurity in Manufacturing-old
    • Penetration Testing Guide
    • CIS Critical Security Controls Template
    • Security Incident Response Plan Template
    • Cybersecurity Status Self-Assessment
  • NEWSLETTER
  • VIDEO LIBRARY
    • Rhyno Videos
      • Rhyno kids
      • Promotional videos
      • Cybersecurity awareness
      • Protect with passion
      • Rhyno Podcast
      • Did you know?
      • The Jhonson family
    • Cybersecurity classes
      • About phishing attacks
      • Kali linux tutorials
      • Offensive ethical hacking tutorials
      • Defensive blue team tutorials
      • Hack the box walkthroughs
      • Danny boy AI cybersecurity tutorials
      • Podcasts
  • Request a Demo
  • 👉 Book a Cybersecurity ASSESSMENT 🗓️

Dan Duran

With over 14 years of experience in the information security industry, Dan Duran currently leads product development and cyber security strategy for Rhyno Cybersecurity. He’s also a sought-out expert for leadership and knowledge on information security, incident response and cyber security best practices.

Dan holds a Master of Business Administration degree from the University of Illinois, Champaign-Urbana, a Bachelor of Economics degree from Wilfrid Laurier University, and post-graduate specializations in Information Systems Security and Agile Software Product Management. Dan is currently pursuing a Master of Science in Cyber Security at the Georgia Institute of Technology.

During his tenure at Rhyno, Dan has played a fundamental role in the continuous development of the company’s 24/7 Security Operations Center and Managed Detection and Response technology.

Author's Articles

Videos Used to Spread Malware via Telegram

Cybersecurity News

Videos Used to Spread Malware via Telegram

FrostyGoop: A New Threat to Industrial Control Systems

Cybersecurity News

FrostyGoop: A New Threat to Industrial Control Systems

Play Ransomware Hits Linux with New Variant

Cybersecurity News

Play Ransomware Hits Linux with New Variant

HotPage Malware Exploits Kernel Driver on Windows Systems

Cybersecurity News

HotPage Malware Exploits Kernel Driver on Windows Systems

MacOS Users Face New Threat from BeaverTail Malware

Cybersecurity News

MacOS Users Face New Threat from BeaverTail Malware

The Konfety Ad Fraud Operation

Cybersecurity News

The Konfety Ad Fraud Operation

Python Repositories at Risk After GitHub Token Leak

Cybersecurity News

Python Repositories at Risk After GitHub Token Leak

Cybersecurity News

Poco RAT Phishing Scam Hits Spanish Speakers

Cybersecurity News

New Ransomware Targets Veeam Backup Software

Cybersecurity News

Cybersecurity Alert: APT40’s Rapid Exploits

Cybersecurity News

Eldorado Ransomware Attacks Windows and Linux

Managed Detection And Response

Managed Detection and Response (MDR): What is it?

Cybersecurity News

Risks of AI Training on Your Data

Cybersecurity News

SnailLoad Attack Spies via Network Latency

Cybersecurity News

Cybercriminals Targets Microsoft Console Files

Cybersecurity News

Google Launches Project Naptime for AI Security Discovery

Cybersecurity News

Intel CPUs Affected by New UEFI Vulnerability

Cybersecurity News

Markopolo’s Crypto Scam via Fake Meeting Software

Cybersecurity News

Cybercriminals use free software to deploy malware.

Cybersecurity News

ASUS Patches Multiple Router Models.

Zero spam, just good stuff

A weekly newsletter delivered straight to your inbox

Sign Up Now!

© 2024 Rhyno Cybersecurity. All rights reserved. Privacy Policy | Terms of Use

Made with in Kitchener-Waterloo, Ontario.

Privacy Preference Center

Privacy Preferences