• 👉 Book a Cybersecurity ASSESSMENT 🗓️
Rhyno Cybersecurity
  • NEWS & BLOGS
    • Managed Detection and Response
    • Security Audits & Penetration Testing
    • Cybersecurity Awareness Training
    • Secure Cloud Hosting
    • Emergency Security Response and Forensics
    • Risk Management & GRC
  • VIDEOS & PODCASTS
  • Resources
    • The Definite Blueprint for Cybersecurity in Manufacturing-old
    • Penetration Testing Guide
    • CIS Critical Security Controls Template
    • Security Incident Response Plan Template
    • Cybersecurity Status Self-Assessment
  • NEWSLETTER
  • VIDEO LIBRARY
    • Rhyno Videos
      • Rhyno kids
      • Promotional videos
      • Cybersecurity awareness
      • Protect with passion
      • Rhyno Podcast
      • Did you know?
      • The Jhonson family
    • Cybersecurity classes
      • About phishing attacks
      • Kali linux tutorials
      • Offensive ethical hacking tutorials
      • Defensive blue team tutorials
      • Hack the box walkthroughs
      • Danny boy AI cybersecurity tutorials
      • Podcasts
  • Request a Demo
  • 👉 Book a Cybersecurity ASSESSMENT 🗓️

Dan Duran

With over 14 years of experience in the information security industry, Dan Duran currently leads product development and cyber security strategy for Rhyno Cybersecurity. He’s also a sought-out expert for leadership and knowledge on information security, incident response and cyber security best practices.

Dan holds a Master of Business Administration degree from the University of Illinois, Champaign-Urbana, a Bachelor of Economics degree from Wilfrid Laurier University, and post-graduate specializations in Information Systems Security and Agile Software Product Management. Dan is currently pursuing a Master of Science in Cyber Security at the Georgia Institute of Technology.

During his tenure at Rhyno, Dan has played a fundamental role in the continuous development of the company’s 24/7 Security Operations Center and Managed Detection and Response technology.

Author's Articles

Cybersecurity News

LockBit Ransomware Shut Down

Cybersecurity News

Hijack Loader Malware Utilizes Process Hollowing

Cybersecurity News

IMPORTANT! Google Simplifies Two-Factor Authentication

Cybersecurity News

Multiple Flaws Affect Xiaomi’s Android Devices

Cybersecurity News

Cybersecurity Monitoring Service: Your Digital Guardian

Cybersecurity News

CISA Alerts on GitLab Password Reset Exploit

Cybersecurity News

U.S. government issues critical infrastructure AI security recommendations.

Cybersecurity News

Sandbox Escape Vulnerabilities in Judge0 Open Systems to Takeover

Cybersecurity News

ToddyCat Hackers Utilize Powerful Tools for Industrial Data Theft

Cybersecurity News

State-backed hackers exploit 2 Cisco vulnerabilities for espionage

Cybersecurity News

CoralRaider Malware Campaign Distributes Info-Stealers by Using CDN Cache

Cybersecurity News

Cyberattacks Real Cost

Cybersecurity News

New Android Trojan ‘SoumniBot’ Hides with Clever Tricks

Cybersecurity News

AWS, Google, and Azure CLI Tools May Contain Credential Leaks

Cybersecurity News

Popular PuTTY SSH Client Is Open to Key Recovery Attack

Cybersecurity News

Palo Alto Networks Issues Quick Fixes for PAN-OS Exploitation

Cybersecurity News

Fortinet Releases Important Security Updates

Cybersecurity News

Microsoft Releases a Massive April Patch Release

Cybersecurity News

V8 Sandbox, a new defense against browser attacks, by Google Chrome

Cybersecurity News

“Latrodectus”: Is This Malware Lurking in Your Email?

Zero spam, just good stuff

A weekly newsletter delivered straight to your inbox

Sign Up Now!

© 2024 Rhyno Cybersecurity. All rights reserved. Privacy Policy | Terms of Use

Made with in Kitchener-Waterloo, Ontario.

Privacy Preference Center

Privacy Preferences