• 👉 Book a Cybersecurity ASSESSMENT 🗓️
Rhyno Cybersecurity
  • NEWS & BLOGS
    • Managed Detection and Response
    • Security Audits & Penetration Testing
    • Cybersecurity Awareness Training
    • Secure Cloud Hosting
    • Emergency Security Response and Forensics
    • Risk Management & GRC
  • VIDEOS & PODCASTS
  • Resources
    • The Definite Blueprint for Cybersecurity in Manufacturing-old
    • Penetration Testing Guide
    • CIS Critical Security Controls Template
    • Security Incident Response Plan Template
    • Cybersecurity Status Self-Assessment
  • NEWSLETTER
  • VIDEO LIBRARY
    • Rhyno Videos
      • Rhyno kids
      • Promotional videos
      • Cybersecurity awareness
      • Protect with passion
      • Rhyno Podcast
      • Did you know?
      • The Jhonson family
    • Cybersecurity classes
      • About phishing attacks
      • Kali linux tutorials
      • Offensive ethical hacking tutorials
      • Defensive blue team tutorials
      • Hack the box walkthroughs
      • Danny boy AI cybersecurity tutorials
      • Podcasts
  • Request a Demo
  • 👉 Book a Cybersecurity ASSESSMENT 🗓️

Dan Duran

With over 14 years of experience in the information security industry, Dan Duran currently leads product development and cyber security strategy for Rhyno Cybersecurity. He’s also a sought-out expert for leadership and knowledge on information security, incident response and cyber security best practices.

Dan holds a Master of Business Administration degree from the University of Illinois, Champaign-Urbana, a Bachelor of Economics degree from Wilfrid Laurier University, and post-graduate specializations in Information Systems Security and Agile Software Product Management. Dan is currently pursuing a Master of Science in Cyber Security at the Georgia Institute of Technology.

During his tenure at Rhyno, Dan has played a fundamental role in the continuous development of the company’s 24/7 Security Operations Center and Managed Detection and Response technology.

Author's Articles

Cybersecurity News

What to do when you get a phishing email?

Cybersecurity News

Cryptojackers Exploit Misconfigured Kubernetes Clusters

Cybersecurity News

Apple Debuts Private Cloud Compute to Enhance AI Privacy

Cybersecurity News

More_eggs Malware Hidden in Fake Resumes

Cybersecurity News

Urgent PHP Fix for Windows Users

Cybersecurity News

TikTok Stars Fall Victim to Zero-Click DM Hacking

Cybersecurity News

Python Developers Hit by Fake “Crytic-Compilers” Scam on PyPI

Cybersecurity News

Cox Modem Vulnerabilities Threaten Millions

Cybersecurity News

LilacSquid’s Cyber Espionage Tactics in IT, Energy, and Pharma

Cybersecurity News

Check Point Alerts on VPN Zero-Day Attacks

Cybersecurity News

WordPress Plugin Hack Steals Credit Card Info from E-Shops

Cybersecurity News

New Phishing Techniques: Cloudflare Workers, HTML Smuggling, and GenAI

Cybersecurity News

Chrome Under Attack – Update ASAP

Cybersecurity News

A Vulnerability in Apache Flink Is Being Actively Exploited

Cybersecurity News

Rockwell’s Call to Disconnect ICS from Internet

Cybersecurity News

Hackers Exploit Unicode in Cloud Services to Spread Malware

Cybersecurity News

Google Patches Active Chrome Zero-Day Exploit

Cybersecurity News

Google Launches AI-Enhanced Security for Android Phones

Cybersecurity News

Urgent update of Google Chrome to fix vulnerability.

Cybersecurity News

Malicious Python Package Mimics Requests Logo for Sliver C2.

Zero spam, just good stuff

A weekly newsletter delivered straight to your inbox

Sign Up Now!

© 2024 Rhyno Cybersecurity. All rights reserved. Privacy Policy | Terms of Use

Made with in Kitchener-Waterloo, Ontario.

Privacy Preference Center

Privacy Preferences