Cybersecurity Quarterly (Summer 2017)

Page 1

Cybersecurity Quarterly An Ethical Hacker’s Guide to Finding Hidden Assets on Your Network The Costly, But Underpublicized Threat of Business Email Compromise Scams

Summer 2017

A Publication from

Information Rights Management: A Time-Tested Solution for New Problems How Phishers Have Evolved to Fool End Users Hook, Line, and Sinker

Network Entanglement In the Age of The Cloud, BYOD, and IoT, Maintaining an Accurate Inventory of Connected Devices is Now More Important Than Ever Before


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Cybersecurity Quarterly (Summer 2017) by Cybersecurity Quarterly - Issuu