Category


Latest Blogs

All Blogs »

March 22, 2017 | Vendor and Partner Management
By Josh More, IANS Faculty

 Setting Requirements for Vendors Storing Sensitive Data

Vetting and managing vendors has become increasingly important for organizations in recent years, particularly for those that are storing, processing or transmitting sensitive data. In this Ask-an-Expert written response, IANS Faculty Josh More walks through a simplified approach to assessing, qualifying, classifying and verifying vendors to ensure they can be trusted to handle sensitive data. 

Read More »


March 22, 2017 | Mobile Access and Device Management
By Aaron Turner, IANS Faculty

 Enterprise Mobility: Defining a Security Strategy

Enterprises today are on their third generation of mobile technologies, and each iteration has had its own unique challenges. In this Ask-an-Expert written response, IANS Faculty Aaron Turner details some of the highest-impact risks organizations face in the mobility space today and offers some maturity-specific approaches companies can take to combat these risks. 

Read More »


March 16, 2017 | Embedded Systems and Internet of Things
By Aaron Turner, IANS Faculty

 Balancing Business Benefits with IoT Dangers

Some say IoT stands for Internet of Threats, but businesses and consumers are rushing headlong into the adoption of everything from wearables to smart buildings. In this report, IANS Faculty Aaron Turner examines the enterprise risks of IoT and explores defensive tactics to help build a short- and long-term strategy to effectively and securely employ IoT technology. 

Read More »


March 15, 2017 | Team Structure and Management
By Adam Ely, IANS Faculty

 Revamping the Security Organization

Every enterprise is different, as is the makeup of just about every security team. Are there any best practices for creating the ideal security organization? In this Ask-an-Expert live response, IANS Faculty Adam Ely offers some strategies for reworking the security organization to gain better alignment, agility and effectiveness.

Read More »


March 13, 2017 | Single Sign-on
By Aaron Turner, IANS Faculty

 Assessing the Pros and Cons of IdentityServer

When evaluating single sign-on (SSO) solutions, it's important to examine a number of factors, including scalability, features, ease-of-use and cost. In this Ask-an-Expert written response, IANS Faculty Aaron Turner examines some of the pros and cons of IdentityServer as an SSO platform and compares it against other popular solutions such as ForgeRock and Active Directory Federation Services. 

Read More »


March 10, 2017 | Architecture, Configuration and Segmentation
By Marcus Ranum, IANS Faculty

 Securing Your Network With Overlapping Controls

Many security practitioners complain about being flooded with alerts and vulnerabilities, because they don't get to design their systems so that the alerts are useful. Segmentation is one of many techniques these practitioners can use to manage alerts and reduce breach
impact. In this webinar, IANS Faculty Marcus Ranum and Ron Dilley describe a model for administratively breaking your network apart into management "zones" that can be analyzed and secured separately.

Read More »


March 9, 2017 | AppDev Frameworks
By Jason Gillam, IANS Faculty

 Deploying Containers Securely

Developers love containers because they are quick, simple to use and allow for easier scaling of hardware resources, but few pay much attention to the security issues they present. With containers in the mix, how can security organizations ensure their developers aren’t continually copying and pasting security issues across the environment? In this report, IANS Faculty Jason Gillam steps you through the worst of the pitfalls to ensure your organization rolls out more secure containerized solutions.

Read More »


March 8, 2017 | Directory Services
By Rich Guida, IANS Faculty

 Detailing Requirements for an IDAM System

Establishing a set of questions and requirements is a critical step in the process of constructing an identity and access management (IDAM) system. In this Ask-an-Expert written response, IANS Faculty Rich Guida details the important questions security teams should be asking their prospective IDAM vendors, ranging from cryptography and authentication requirements to privilege management and separation of duties. 

Read More »


March 7, 2017 | Security Operations Centers (SOCs)
By Mike Rothman, IANS Faculty

 Overcoming Resistance to SOC Data Collection

How can you run an effective security operations center (SOC) when operations won't provide you with the right data? In this Ask-an-Expert live interaction, IANS Faculty Mike Rothman outlines some potential reasons for operations' lack of cooperation and provides strategies for overcoming them.

Read More »


March 2, 2017 | Malware and Advanced Threats
By Ken Van Wyk, IANS Faculty

 Fake News: Fighting a Rampant Malware Delivery Mechanism

Due to its unprecedented success during the recent presidential election, fake news is increasingly being adopted by hackers as an elegant malware delivery mechanism, on par with spear-phishing email. In this report, IANS Faculty Ken Van Wyk details how fake news can be weaponized and offers some concrete steps to protect your company.

Read More »


February 28, 2017 | Privacy
By Aaron Turner, IANS Faculty

 Protecting Data Transferred From Canada

While Canadian regulators in the past typically followed U.S. precedent on data protection standards, the country has moved closer toward the EU model over the past few years. In this Ask-an-Expert written response, IANS Faculty Aaron Turner recommends companies handling Canadian citizen data follow the EU General Data Protection and offers some technical guidance for implementing the necessary controls. 

Read More »


February 27, 2017 | Vendor and Partner Management
By Josh More, IANS Faculty

 Managing Vendors With Disparate Frameworks

Vendor due diligence becomes even more challenging when there are a variety of information security frameworks in play. In this Ask-an-Expert written response, IANS Faculty Josh More details two approaches to the problem: a formalized mapping process using the COBIT framework and an ad-hoc approach designed to prioritize the specific risks facing the organization. 

Read More »


February 24, 2017 | Vulnerability Assessment and Management
By Kevin Beaver, IANS Faculty

 Assessing Vulnerability Scanning/Management Tools

When it comes to selecting a vulnerability scanning tool, it's often the level of service provided (and not technical capabilities) that separates the various solutions. In this Ask-an-Expert written response, IANS Faculty Kevin Beaver offers a breakdown of some of the key solutions in the space and details some important considerations for organizations in the process of choosing a vendor. 

Read More »


February 23, 2017 | Malware and Advanced Threats
By Kevin Beaver, IANS Faculty

 Strategies for Thwarting State-Sponsored Hacks

State-sponsored attackers are, by definition, highly skilled and highly funded. How can we keep up? In this report, IANS Faculty Kevin Beaver details the challenges around state-sponsored hacking, including the threats, vulnerabilities and risks that must be addressed, starting today, if organizations are going to stay off their radar. 

Read More »


February 23, 2017 | Encryption, Digital Signatures, Certificates, Tokenization
By David Etue, IANS Faculty

 Best Practices for Managing Keys

There is no one-size-fits-all approach to key management, and the solutions available today vary based on security and the types of keys they can manage. In this Ask-an-Expert written response, IANS Faculty David Etue assesses the current key management solution landscape and details some common pitfalls organizations face when it comes to storing and managing their keys. 

Read More »


February 22, 2017 | Enterprise and IT Compliance Management
By Josh More, IANS Faculty

 Achieving HITRUST Certification Under Tight Time and Staffing Constraints

Achieving HITRUST certification, in addition to SOC 1 and 2, is no easy feat, especially when the security organization is under-staffed and running up against tight deadlines. In this Ask-an-Expert live interaction, IANS Faculty Josh More offers some tips for easing the process and avoiding common pitfalls.

Read More »


February 16, 2017 | Cloud Access Security Brokers
By George Gerchow, IANS Faculty

 Deciphering the Dynamic CASB Marketplace

The cloud access security broker (CASB) market continues to mature. In this report, IANS Faculty George Gerchow provides an update, detailing the relevant vendors, their latest capability sets and the various deployment models available. He also offers some guidance on choosing the right CASB for your needs and cloud maturity level, as well as trends to expect in the future.

Read More »


February 15, 2017 | Virtual Private Networks
By Dave Shackleford, IANS Faculty

 DirectAccess: Understanding the Pros and Cons

Microsoft's DirectAccess offers some clear operational and cost advantages for organizations, but it also brings with it some potential drawbacks from a security perspective. In this Ask-an-Expert written response, IANS Faculty Dave Shackleford assesses these pros and cons and details some of the security considerations organizations need to take into account when deciding to implement DirectAccess. 

Read More »


February 9, 2017 | Incident Response Planning
By Ondrej Krehel, IANS Faculty

 Getting the Most from Your Incident Response Engagement

The actions taken after an incident can either lead to improving your security posture and building trust with your customers – or not. In this report, IANS Faculty Ondrej Krehel details ways to ensure the findings uncovered during your incident response (IR) engagements are fully internalized and integrated into your processes and business continuity plans going forward. 

Read More »


February 8, 2017 | Single Sign-on
By Aaron Turner, IANS Faculty

 Single Sign-On Platform Comparison

The identity and access management market is undergoing significant upheaval due to past under-investment in the space. In this Ask-an-Expert written response, IANS Faculty Aaron Turner offers a breakdown of the single sign-on (SSO) solution marketplace and provides recommendations for selecting a platform. 

Read More »


February 3, 2017 | Security Awareness, Phishing, Social Engineering
By Mike Saurbaugh, IANS Faculty

 Helping Users Avoid Common Tax Scams

While some people anxiously await their tax refund, scammers are also waiting with bated breath for unsuspecting individuals to slip up and fall for one of their tactics. In this Ask-an-Expert written response, IANS Faculty Mike Saurbaugh reviews some of the most common tax scams and offers some tips and proactive defenses to avoid getting 

Read More »


February 1, 2017 | Authentication
By Michael Pinch, IANS Faculty

 Authenticating Customers via Fingerprint Biometrics

A security team is considering using fingerprint-based biometrics to authenticate customers at its company's retail stores, but what are the pros/cons? In this Ask-an-Expert live interaction, IANS Faculty Mike Pinch details the current state of fingerprint biometrics and offers some advice for safe, cost-effective implementation.

Read More »


February 1, 2017 | Regulations & Legislation
By Debra Farber, IANS Faculty

 International Security, Privacy and Compliance Laws: Q4 2016 Update

Each quarter, IANS provides an update on the emerging international compliance laws and regulations that impact the information security community. For Q4 2016, we provide a short summary for each jurisdiction in which there was a change, followed by a more detailed description. An updated table of jurisdictions and changes can be accessed here.

Read More »


January 27, 2017 | Team Structure and Management
By Stan Dolberg, IANS Faculty

 Where CISOs Report: A Snapshot

While most CISOs report to IT leadership today, this is not the ideal reporting relationship for managing information-security risk. In this Ask-an-Expert written response, IANS Chief Research Officer Stan Dolberg reviews data from IANS CISO Impact research, which demonstrates that an experienced CISO is positioned for maximum influence when reporting into an organization's senior management. 

Read More »


January 26, 2017 | Threat Intelligence and Modeling
By Bill Dean, IANS Faculty

 Pros and Cons of CISA’s Threat-Sharing Program

With the passage of CISA and with DHS’ Automated Indicator Sharing (AIS) program getting up and running, organizations interested in sharing threat intelligence can now consider automating the process. How can they ensure their automated feed is scrubbed of PII and won’t leave them open to liability or privacy concerns? In this report, IANS Faculty Bill Dean offers tips for sharing threat indicators both automatically and safely.

Read More »


January 25, 2017 | Cloud Access Security Brokers
By George Gerchow, IANS Faculty

 Security Considerations Before Going Cloud-First

The business decision to go cloud-first has many implications, not the least of which is security. What do information security teams need to do up-front to ensure critical business data remains safe in this new paradigm? In this Ask-an-Expert live interaction, IANS Faculty George Gerchow offers some key strategies, tools and processes to put in place to ensure success.

Read More »


January 25, 2017 | Mobile Access and Device Management
By Aaron Turner, IANS Faculty

 Preventing Phishing on Mobile Devices

Phishing attacks happen on every platform, but few anti-phishing tools are available for mobile. In this Ask-an-Expert live interaction, IANS Faculty Aaron Turner suggests some network-based controls that can help reduce the risk and underscores the need for mobile-focused user awareness training.

Read More »


January 18, 2017 | Directory Services
By Jason Gillam, IANS Faculty

 Selecting an Access Management Solution

Access management within an organization can often be non-standardized, decentralized, mismanaged and unreliable. In this Ask-an-Expert written response, IANS Faculty Jason Gillam describes three potential solutions to this problem of access management and offers recommendations for when organizations should consider leveraging vendor solutions. 

Read More »


January 12, 2017 | Malware and Advanced Threats
By Mike Saurbaugh, IANS Faculty

 IANS Vulnerability and Breach Update: Q4 2016

A new vulnerability or breach seems to be discovered daily, but which should be taken more seriously and which are overhyped? In this report, IANS Faculty Mike Saurbaugh looks back over the major breaches and vulnerabilities of the past three months, explains them and provides real-world context and perspective.

Read More »


January 11, 2017 | Team Structure and Management
By David Kolb, IANS Faculty

 Managing Difficult Infosec Conversations

Information security professionals sign up for some daunting challenges. Building a toolkit of “soft skills” alongside technical expertise can make the difference in meeting those challenges. In this report, IANS Faculty David Kolb offers strategies for managing difficult conversations, from crafting a well-prepared message to handling the response in an effective manner. 

Read More »


January 10, 2017 | Security Awareness, Phishing, Social Engineering
By Mike Saurbaugh, IANS Faculty

 Moving From Security Awareness Toward Behavioral Change

There is no one-size-fits-all approach to security awareness, and the levels to your awareness program will vary based on department and the users' general knowledge of security. In this Ask-An-Expert written response, IANS Faculty Mike Saurbaugh details certain steps you can take to bring your program from basic awareness to actual behavioral change, and offers tips for measuring the success of your security awareness program. 

Read More »


January 6, 2017 | Cloud Application and Data Controls
By Dave Shackleford, IANS Faculty

 IANS Cloud Security Update: Q4 2016

As more organizations move services and computing assets into cloud service provider environments, the need for adequate security controls grows as well. In this quarterly research report, IANS Faculty Dave Shackleford updates IANS’ clients on the new developments occurring in the cloud security arena.

Read More »


January 6, 2017 | Team Structure and Management
By David Kolb, IANS Faculty

 Keeping CALM: Building the Business Relationships that Drive Infosec Success

CISOs and information security leaders are called upon to develop partnerships throughout their organizations in an effort to better align their objectives with those of the business. To do this, they need to understand how other leaders operate and determine how to best motivate them. In this webinar, professional development expert and IANS Faculty David C. Kolb, Ph.D. discussed his model for improving communication and facilitating leadership that drives effective partnerships, rather than simply transactional relationships.

Read More »


January 5, 2017 | Malware and Advanced Threats
By Dave Shackleford, IANS Faculty

 Information Security Trends for 2017

2016 was a challenging year for infosec, with the proliferation of ransomware, IoT botnets and more. What new attacks will surface in 2017, and what hot technologies are on the horizon to fight them? In this webinar and corresponding report, IANS Lead Faculty Dave Shackleford reveals major trends in store for IT security professionals in the coming year.

Read More »


January 4, 2017 | Regulations & Legislation
By Daniel Maloof, IANS Managing Editor

 Trump and Security: What to Expect in the New Administration

We all know incoming U.S. President Donald Trump is focused on physical security and building the wall, but what about cybersecurity policy? In this report, a handful of IANS Faculty detail what they believe we should expect from the new Donald Trump administration in terms of digital privacy, consumer protections, the EU-U.S. Privacy Shield, the U.S. Cybersecurity Framework and more.

Read More »


December 13, 2016 | Encryption, Digital Signatures, Certificates, Tokenization
By Davi Ottenheimer, IANS Faculty

 Detailing Technical Considerations For Implementing Tokenization Solutions

Although the concept of tokenization in IT can be easily explained, it can be complicated to architect and deploy these tokens for safe and reliable use. In this Ask-an-Expert written response, IANS Faculty Davi Ottenheimer offers a list of technical considerations to ease the process of selecting and implementing tokenization solutions.

Read More »


December 9, 2016 | Risk Management
By Rich Guida, IANS Faculty

 Understanding the Relationship Between Physical and Logical Information Security

The relationship between physical security and cybersecurity can be more closely linked than some organizations might think. In this Ask-an-Expert written response, IANS Faculty Rich Guida details specific instances (i.e., insider threats) where the two types of security come together and offers insight into the practice of "incrementalism."

Read More »


November 28, 2016 | Embedded Systems and Internet of Things
By Chris Poulin, IANS Faculty

 Hidden Threats in Smart Buildings

In a quest to reduce energy consumption and make daily activities more convenient and pleasant for their occupants, smart buildings are becoming ever more interconnected, internet-connected and complex. In this report, IANS Faculty Chris Poulin details the latest advances in smart building technologies, the hidden threats they expose and key steps to take to ensure your smart building doesn’t become your latest threat vector.

Read More »


November 22, 2016 | Embedded Systems and Internet of Things
By Chris Poulin, IANS Faculty

 Mirai Defense: Detecting IoT Devices on the Network

The recent Mirai botnet that took down DNS provider Dyn underscored the risks associated with unmanaged, unsecured Internet-of-Things (IoT) devices. In this Ask-an-Expert live interaction, IANS Faculty Chris Poulin explains how to discover/detect rogue IoT devices on the network and track them over time

Read More »


November 21, 2016 | Application Development and Testing
By Jason Gillam, IANS Faculty

 Secure Development Practices for Mobile Applications

Best practices around the secure development of mobile applications are still evolving because of the rapid evolution of the mobile platforms themselves. In this Ask-an-Expert written response, IANS Faculty Jason Gillam outlines the key differences between the secure development of mobile and web applications, and details standard accepted practices around encryption and authentication.

Read More »


November 18, 2016 | Team Structure and Management
By Dave Shackleford, IANS Faculty

 Security Operations Maturity Chart

For security organizations, understanding where you stand from a maturity perspective can offer valuable insight into which processes and procedures need to be improved. In this Ask-an-Expert written response, IANS Faculty Dave Shackleford charts benchmarks for certain aspects within information security, from event detection and incident management to metrics and data visualization

Read More »


November 14, 2016 | Data Classification
By Kevin Beaver, IANS Faculty

 Where, Exactly, Is Your Information?

Do you know where all of your critical data is located? Studies show that few information security pros do. In this report, IANS Faculty Kevin Beaver underscores the importance of data classification and offers tips to not only find exactly where sensitive information is located, but establish the right controls to ensure you always know where it is and that it’s secured effectively.

Read More »


November 14, 2016 | Endpoints
By Dave Shackleford, IANS Faculty

 Endpoint Protection: Burn and Churn

Malware containment has devolved into an arms race, with a steady stream of solutions and rapidly evolving new problems, leaving IT security struggling to keep up and make sense of it all. In this webinar, IANS Faculty Dave Shackleford examines the new players and techniques in the space, and reviews some of the tried-and-true strategies, including whitelisting, sandboxing, segmentation and configuration management.

Read More »


November 10, 2016 | Converged Infrastructure
By Aaron Turner, IANS Faculty

 Bluetooth Security Risks: An Overview

When it comes to evaluating Bluetooth security risks, it's important to divide up the technology into different sections and examine the potential risks of each. In this Ask-an-Expert written response, IANS Faculty Aaron Turner evaluates Bluetooth security from the perspectives of physical-layer, protocol implementation and application-layer vulnerabilities.

Read More »


November 7, 2016 | Malware and Advanced Threats
By Adam Ely, IANS Faculty

 Protecting Against the Latest Wave of DDoS Attacks

Now that Internet-of-Things (IoT)-based DDoS attacks are in the news, is it time to rethink your DDoS strategy? In this Ask-an-Expert live interaction, IANS Faculty Adam Ely outlines key strategies to implement at the network, server and operations level to defend against all types of DDoS attacks, even this latest iteration.

Read More »


November 7, 2016 | Vendor and Partner Management
By Marty Gomberg, IANS Faculty

 Identifying Vendor Risk Red Flags

When it comes to evaluating vendors, there are a number of factors organizations need to keep in mind, from integration costs to uptime guarantees. In this Ask-an-Expert written response, IANS Faculty Martin Gomberg lays out some of the major red flags organizations should look out for when evaluating vendors, from the due diligence phase to the questionnaire process.

Read More »


November 3, 2016 | Vulnerability Assessment and Management
By Michael Pinch, IANS Faculty

 Vulnerability Patching Policy Best Practices

Patching and vulnerability management can be a highly variable process depending on a number of factors, but there are some basic best practices that organizations can adhere to. In this Ask-an-Expert written response, IANS Faculty Mike Pinch details these best practices for vulnerability scanning and management, including for servers, endpoints and at the application level.

Read More »


November 3, 2016 | Malware and Advanced Threats
By Michael Pinch, IANS Faculty

 Health Care Roundtable: Tackling Ransomware

Ransomware is a scourge across every vertical but it seems to have found a soft spot in health care. For this roundtable, IANS brought together a group of health care sector security executives to talk about the problems they face and the strategies they are using to get ahead of the ransomware issue.

Read More »


November 2, 2016 | Risk Management
By Michael Pinch, IANS Faculty

 Breaking Down the Top 5 Security Risks Facing Health Care Organizations

The top priorities for health care organizations today are uptime and free access to data, which means companies in this space face a number of security challenges. In this Ask-an-Expert written response, IANS Faculty Mike Pinch details the major security risks the health care industry is dealing with today - from ransomware to the Internet of Things - and offers strategies for tackling these challenges.

Read More »


October 31, 2016 | Application Development and Testing
By Jason Gillam, IANS Faculty

 Application-Level DoS: Are You Ready?

Application-level DoS attacks can be difficult to detect, challenging to diagnose, and when effectively exploited, they can render your application completely inaccessible. In this report, IANS Faculty Jason Gillam explains how application-level DoS works and offers some key mitigation strategies. 

Read More »


October 27, 2016 | Insider Threats
By John Strand, IANS Faculty

 Going from Reactive to Proactive with Insider Threats

Honing your response to an insider threat is difficult enough, but building on the program to proactively identify and thwart potential malicious insiders is fraught with risk. In this Ask-an-Expert live interaction, IANS Faculty John Strand outlines the importance of partnering with HR, choosing the right tool set and funding the program adequately.

Read More »


October 20, 2016 | Encryption, Digital Signatures, Certificates, Tokenization
By Dave Shackleford, IANS Faculty

 Assessing Key Management Services Within AWS

There are a number of key management tools and services that organizations can use within the AWS cloud. In this Ask-an-Expert written response, IANS Faculty Dave Shackleford breaks down some of the major players in the space, including Amazon's own key management service, HyTrust DataControl and Vault.

Read More »


October 20, 2016 | Cloud Network and Host Controls
By Dave Shackleford, IANS Faculty

 Securing Hybrid Clouds

Hybrid clouds offer organizations the ultimate in flexibility, enabling IT to keep sensitive workloads in-house while taking advantage of the efficiencies and scalability of public clouds for everything else. But how secure is the setup? In this report, IANS Faculty Dave Shackleford steps you through the challenges of securing hybrid clouds and provides advice to ensure workloads remain secure, no matter where they are run.

Read More »


October 18, 2016 | Mainframe and Legacy Systems
By Philip Young, IANS Faculty

 Mainframes, APIs and the False Sense of Security

Mainframes usually hold companies’ most sensitive, mission-critical data. As more organizations decide to open up their mainframe “crown jewels” to participate in today’s mobile/cloud world, however, is mainframe security keeping up? In this report, IANS Faculty Philip Young details the riskiest areas of the mainframe and explains how best to secure them against today’s threats.

Read More »


October 13, 2016 | Networking and Network Devices
By Mike Saurbaugh, IANS Faculty

 What to Look for in a Secure Web Gateway

Secure web gateways provide a staple in network infrastructure and the market seems to suggest they will be around for the next few years. In this Ask-an-Expert written response, IANS Faculty Mike Saurbaugh explores the capabilities of modern proxy solutions and offers selection criteria to help evaluate various solutions.

Read More »


October 6, 2016 | Security Policies and Strategy
By Michael Pinch, IANS Faculty

 5 Ways to Improve Security While Cutting Costs

Attacks and malware continually evolve, forcing organizations to react by implementing an ever-expanding tool set. Unfortunately, few budgets expand in kind. In this report, IANS Faculty Michael Pinch details five key ways to immediately improve your organization’s security posture, without breaking the budget.

Read More »


October 6, 2016 | Regulations & Legislation
By Randy Sabett, IANS Faculty

 International Security, Privacy and Compliance Laws: Q3 2016 Update

Each quarter, IANS provides an update on the emerging international compliance laws and regulations that impact the information security community. For Q3 2016, we provide a short summary for each jurisdiction in which there was a change, followed by a more detailed description. An updated table of jurisdictions and changes can be accessed here.

Read More »


October 4, 2016 | Data Breaches
By Mike Saurbaugh, IANS Faculty

 IANS Vulnerability and Breach Update: Q3 2016

A new vulnerability or breach seems to be discovered daily, but which should be taken more seriously and which are overhyped? In this report, IANS Faculty Mike Saurbaugh looks back over the major breaches and vulnerabilities of the past three months, explains them and provides real-world context and perspective.

Read More »


October 3, 2016 | Cloud Network and Host Controls
By Dave Shackleford, IANS Faculty

 IANS Cloud Security Update: Q3 2016

As more organizations move services and computing assets into cloud service provider environments, the need for adequate security controls grows as well. In this quarterly research report, IANS Faculty Dave Shackleford updates IANS’ clients on the new developments occurring in the cloud security arena.

Read More »


October 1, 2016 | Risk Management
By Rich Guida, IANS Faculty

 Best Practices for Risk Registers

When it comes to building a risk register, there are a number of important steps organizations must take. In this Ask-an-Expert written response, IANS Faculty Rich Guida details the process of constructing a risk register and offers specific criteria for determining how accurate and successful it is.

Read More »


September 29, 2016 | Threat Intelligence and Modeling
By Aaron Turner, IANS Faculty

 Breaking Down Cyber Threat Trends in Mexico

For organizations that operate in Mexico and Latin America, it's important to keep tabs on the current cyberthreat trends taking hold in these countries. In this live Ask-an-Expert response, IANS Faculty Aaron Turner details the current threat landscape in Mexico and Latin America, from ATM attacks to state-sponsored cybercrime.

Read More »


September 29, 2016 | Cloud Application and Data Controls
By Dave Shackleford, IANS Faculty

 Detailing Security Controls For Office 365

When deploying Office 365, organizations need to take a number of steps to ensure they are implementing the proper security controls as well. In this Ask-an-Expert written response, IANS Faculty Dave Shackleford explains the core security controls and settings that should be implemented, including configuring TLS encryption connectors for mail and enabling content searches for e-discovery.

Read More »


September 29, 2016 | Privileged Access Management
By Aaron Turner, IANS Faculty

 Using a Bastion Forest for Privileged Account Management in Microsoft AD Environments

In Microsoft Active Directory (AD) environments, a bastion forest can be used to both reliably manage privileged access and recover a compromised AD implementation. In this report, IANS Faculty Aaron Turner explains the theory behind the bastion forest and steps you through the process of setting one up. He also explains how some organizations may be able to use a bastion forest as a cost-effective alternative to pricier privileged access management (PAM) tools.

Read More »


September 28, 2016 | Networking and Network Devices
By Aaron Turner, IANS Faculty

 Preparing for a DDoS Attack

When it comes to preparing for and responding to DDoS attacks, there is no one-size-fits-all approach. In this Ask-an-Expert written response, IANS Faculty Aaron Turner breaks down the different types of DDoS attack and offers a number of strategies and tools that organizations can lean on to better prepare for them.

Read More »


September 23, 2016 | Recruiting, Hiring and Retention
By Adam Ely, IANS Faculty

 Building and Staffing a Winning Security Team

The fierce competition for skilled, experienced security practitioners has made the infosec talent shortage a top concern for security leaders. How do you assemble a world-class team in such a withering environment? In this webinar, IANS Faculty Adam Ely shares key hiring and retention strategies to help you out-recruit your competitors and keep the all-star players you need to win.

Read More »


September 21, 2016 | Insider Threats
By Bill Dean, IANS Faculty

 Insider Threats: Understanding the Risks

Insider threats can often pose a greater risk to an organization than external actors. In this Ask-an-Expert written response, IANS Faculty Bill Dean offers some key statistics regarding insider threats and provides a number of steps organizations can take to anticipate and prepare for the risks posed by insiders.

Read More »


September 20, 2016 | Security Awareness, Phishing, Social Engineering
By Chris Gonsalves, IANS Director of Technology Research

 Recognizing, Protecting Against Social Media Threats

These days, enterprises need to be very aware of the fact that once information gets posted to a social site, it can never again be considered private. In this Ask-an-Expert written response, IANS Director of Technology Research Chris Gonsalves breaks down some of the common types of social media-related attacks organizations could face and offers a number of tips and features designed to combat these attacks.

Read More »


September 12, 2016 | Risk Management
By Adam Ely, IANS Faculty

 IT Governance Everyone Can Live With

Building a quality, efficient, multi-entity governance, risk and compliance (GRC) structure that doesn’t slow business units and allows for consistent and effective risk mitigation is hard but achievable. In this report, IANS Faculty Adam Ely explains how to determine costs, handle staffing and empower stakeholders to create a GRC program that efficiently mitigates risk and garners support from line-of-business leaders.

Read More »


September 1, 2016 | Software Development Lifecycle (SDLC)
By Jason Gillam, IANS Faculty

 Ensuring a PCI-Compliant SDLC Review Process

Establishing a review process for PCI DSS compliance is something organizations should do in a strategic, ongoing fashion, rather than as a once-per-year activity. In this Ask-an-Expert written response, IANS Faculty Jason Gillam details the Building Security in Maturity Model (BSIMM) and demonstrates how organizations can consult this framework to build a continuous compliance review process within the software development lifecycle.

Read More »


August 26, 2016 | Cloud Application and Data Controls
By George Gerchow, IANS Faculty

 Securing Microsoft Office 365 and OneDrive for Mobile Access

Moving to Office 365 and other cloud applications presents both security and compliance challenges. In this Ask-an-Expert live interaction, IANS Faculty George Gerchow recommends using a CASB, together with Microsoft's own DLP and SharePoint data classification schemes to keep corporate data safe while easing access for mobile and cloud users.

Read More »


August 23, 2016 | Intrusion Prevention/Detection (IPS/IDS)
By Dave Kennedy, IANS Faculty

 Detailing the Benefits of Network- and Host-Based IDS/IPS Solutions

Both network- and host-based IDS solutions are critical for organizations when it comes to quickly identifying threats. In this Ask-an-Expert written response, IANS Faculty Dave Kennedy breaks down the advantages and limitations of each and offers recommendations for organizations to get the most out of their IDS/IPS solutions.

Read More »


August 22, 2016 | Security Analytics and Visualization
By Dave Shackleford, IANS Faculty

 Assessing Tools for Data Lineage Visualization

Most tools for performing data lineage visualization fall into one of two categories: data analytics processing or fraud analytics. In this Ask-an-Expert written response, IANS Faculty Dave Shackleford details the top analytics processing and visualization tools, including some open-source options that can be used to analyze large quantities of logs and events.

Read More »


August 18, 2016 | Security Awareness, Phishing, Social Engineering
By Kevin Beaver, IANS Faculty

 CEO Spoofing: Don't Get Fooled!

Austrian aerospace firm FACC fired its CEO after losing nearly €50 million when fraudsters posing as the CEO forced the finance department to approve multimillion dollar payments. In this report, IANS Faculty Kevin Beaver explains how such scams work and offers tips to ensure your company doesn’t become the next victim.

Read More »


August 15, 2016 | Threat Intelligence and Modeling
By Michael Pinch, IANS Faculty

 IANS Pragmatic Threat Modeling

IT Security has long been a practitioner of traditional risk assessments, but threat modeling brings an entirely new, attacker-centric view of your systems. Threat modeling methodologies have been around in many forms, but until now, there hasn't been a simple and time-effective way to operationalize them. In this webinar, IANS Faculty Mike Pinch delves into the IANS Pragmatic Threat Modeling Toolkit, designed to help jumpstart and evolve your organization's risk management efforts.

Read More »


August 15, 2016 | Incident Response Planning
By Bill Dean, IANS Faculty

 Creating Effective Tabletop Exercises

Designed correctly, tabletop exercises can help you determine how well your people, processes and technologies are prepared for an incident – and improve that preparation over time. In this report, IANS Faculty Bill Dean steps you through the process of designing, planning and executing effective tabletop exercises. 

Read More »


August 9, 2016 | Security Analytics and Visualization
By Dave Shackleford, IANS Faculty

 User Behavior Analytics: A Tools Overview

Over the past few years, a number of organizations have begun to implement a user behavior analytics program in an effort to combat things like insider threats. In this live Ask-an-Expert interaction with the security team at a large financial services organization, IANS Faculty Dave Shackleford assesses the current landscape of user behavior analytics tools and offers tips and pitfalls to consider when implementing such a program.

Read More »


August 9, 2016 | Team Structure and Management
By Rich Guida, IANS Faculty

 Prioritizing Risk to Manage the Security Team’s Workload

When it comes to managing the workload of the security team (particularly if it only has a few members), prioritizing organizational risks is an important first step. In this Ask-an-Expert written response, IANS Faculty Rich Guida offers tips for developing a true risk register, compiling critical metrics and getting the various business units to own risks.

Read More »


August 2, 2016 | IT Asset Disposal (ITAD)
By Chris Poulin, IANS Faculty

 IT Asset Management Tools and Best Practices

IT asset management is an ongoing process that requires continual maintenance and dedicated resources. In this Ask-an-Expert written response, IANS Faculty Chris Poulin provides an overview of the tools required for building and tracking an inventory, and offers best practices for managing an organization's physical and virtual assets.

Read More »


July 21, 2016 | Penetration Testing and Red Teaming
By Bill Dean, IANS Faculty

 Examining Top Penetration Testing Tools

As the features and functionality of vulnerability assessment and penetration tools continue to evolve, a number of vendors have begun to enter the spaces. In this Ask-an-Expert written response, IANS Faculty Bill Dean details the various open-source and commercial tools available and offers factors to consider for choosing the most effective solutions. 

Read More »


July 21, 2016 | Enterprise and IT Compliance Management
By Adam Ely, IANS Faculty

 Keeping Compliant With PCI After Certification

Maintaining PCI compliance is a factor of how well you can build ongoing PCI-based tasks into the normal operating processes of your organization. In this Ask-an-Expert written response, IANS Faculty Adam Ely provides a sample PCI compliance task tracking list that organizations can use to describe various PCI tasks and the frequency at which they need to be addressed. 

Read More »


July 20, 2016 | Security Awareness, Phishing, Social Engineering
By Kati Rodzon, IANS Faculty

 Improving Security Awareness Training Through Gamification

Information security is not all fun and games… or is it? More and more, organization are turning to gamification to boost the effectiveness of user security awareness training. In this webinar, IANS Faculty Katrina Rodzon discusses the key behavioral factors for successful gamified security training programs and explains how to set clear expectations for your program, identify user behaviors to target and manipulate the learning curve to maximize results.

Read More »


July 18, 2016 | Encryption, Digital Signatures, Certificates, Tokenization
By Dave Shackleford, IANS Faculty

 The Death of SSL/TLS and Rise of Blockchain: Considering Future Models of Trust

Current trust models that depend on SSL/TLS and certificate authorities were fine for the client/server era, but new modes of trust are required to handle mobile/cloud/IoT. In this report, IANS Faculty Dave Shackleford examines emerging trust models and consider what this new future of trust might look like.

Read More »


July 7, 2016 | Vulnerability Assessment and Management
By Mike Saurbaugh, IANS Faculty

 IANS Vulnerability and Breach Update: Q2 2016

A new vulnerability or breach seems to be discovered daily, but which should be taken more seriously and which are overhyped? In this report, IANS Faculty Mike Saurbaugh looks back over the major breaches and vulnerabilities of the past three months, explains them and provides real-world context and perspective. 

Read More »


July 6, 2016 | Privacy
By Randy Sabett, IANS Faculty

 International Security, Privacy and Compliance Laws: Q2 2016 Update

Each quarter, IANS provides an update on the emerging international compliance laws and regulations that impact the information security community. For Q2 2016, we provide a short summary for each jurisdiction in which there was a change, followed by a more detailed description. An updated table of jurisdictions and changes can be accessed here.

Read More »


July 5, 2016 | Cloud Network and Host Controls
By Dave Shackleford, IANS Faculty

 IANS Cloud Security Update: Q2 2016

As more organizations move services and computing assets into cloud service provider environments, the need for adequate security controls grows as well. In this quarterly research report, IANS Faculty Dave Shackleford updates clients on the new developments occurring in the cloud security arena. 

Read More »


June 30, 2016 | Encryption, Digital Signatures, Certificates, Tokenization
By Aaron Turner, IANS Faculty

 Encrypting Data at Rest With Pre-Boot Authentication

When it comes to encrypting data at rest on a laptop or desktop, enterprises can choose to employ software-, hardware- or user-driven pre-boot authentication (PBA) methods. In this Ask-an-Expert written response, IANS Faculty Aaron Turner details each approach and explains why using Trusted Platform Modules (TPMs) is likely the most effective strategy.

Read More »


June 27, 2016 | Cloud Access Security Brokers
By Ed Moyle, IANS Faculty

 Identity as a Service: Deciding When It Makes Sense

As more companies start using cloud services, many are considering identity as a service (IDaaS) to help simplify identity management, but is it a good idea? In this report, IANS Faculty Ed Moyle provides a quick market overview, some common use cases, and tips for deciding when IDaaS can work – and when it can’t.

Read More »


June 17, 2016 | Incident Investigations, Handling and Tracking
By Jason Gillam, IANS Faculty

 Choosing a Vendor For Phishing Awareness Training

Phishing awareness training represents a rapidly growing market within the information security services space. In this Ask-an-Expert written response, IANS Faculty Jason Gillam offers tips for identifying which phishing awareness vendors organizations should avoid and which risks to consider when ultimately making the decision, including security of the vendor, cost and value provided.

Read More »


June 17, 2016 | Firewalls, NGFW
By Dave Shackleford, IANS Faculty

 Understanding AWS Network Security Firewall Requirements

Choosing a firewall to leverage within Amazon Web Services comes with a number of important considerations. In this Ask-an-Expert written response, IANS Faculty Dave Shackleford lists the benefits of using a third-party firewall and details the key factors organizations need to consider when choosing a firewall, including support level, cross-cloud compatibility and, ultimately, cost.

Read More »


June 14, 2016 | Authentication
By Aaron Turner, IANS Faculty

 Assessing Biometrics as an Authentication Method

The adoption of biometrics as a means of authentication has experienced fluctuating popularity in recent years. In this Ask-an-Expert written response, IANS Faculty Aaron Turner details the current state of the biometrics space and explains why biometric identification is best used as a secondary authentication method.

Read More »


June 13, 2016 | Virtual Private Networks
By Aaron Turner, IANS Faculty

 Managing the Risks of Remote Access

Providing remote access to employees can present a host of potential security challenges. In this Ask-an-Expert written response, IANS Faculty Aaron Turner details the approaches companies can take to provide their employees with secure remote access and explains that costs and resources will ultimately dictate which path to take.

Read More »


June 10, 2016 | Incident Response Planning
By Ken Van Wyk, IANS Faculty

 Keeping it Real: Tips for Turbocharging Your Incident Response Prep

Well-rounded incident-response processes can greatly reduce operational disruptions resulting from security incidents. But incident-response protocols are only as good as the people, processes and tools involved. In this webinar, IANS Faculty Ken van Wyk shows you how to get your security teams in shape to defend the organization through relevant, real-world incident-response exercises.

Read More »


June 2, 2016 | Networking and Network Devices
By Marcus Ranum, IANS Faculty

 From Tools to Understanding: Reinventing Security

Let’s face it: Current security practices just aren't working. Patching – and playing whack-a-mole with malware – is an endless, grinding failure. In this report, IANS Faculty Marcus Ranum introduces a completely new model for building secured networks from the ground up and uses real-world examples to show how putting in some hard work upfront can pay big security dividends.

Read More »


May 31, 2016 | Risk Management
By George Gerchow, IANS Faculty

 Creating Archer Dashboards

Gleaning useful data/metrics from Archer dashboards (and leveraging this information) can be a challenge for security teams. In this Ask-an-Expert written response, IANS Faculty George Gerchow recommends taking a phased approach, starting with modules such as Compliance and Vendor Management, in order to generate buy-in from other departments outside of IT.

Read More »


May 26, 2016 | IT Forensics
By Bill Dean, IANS Faculty

 Mobile Device Forensics: A Tools Overview

Mobile device forensics tools in the marketplace today vary greatly in both capability and price. In this Ask-an-Expert written response, IANS Faculty Bill Dean assesses a number of these solutions and explains that budget and the types of mobile phones in your environment are the two main factors for selecting the right forensics tool.

Read More »


May 23, 2016 | Vendor and Partner Management
By Adam Ely, IANS Faculty

 Automating the Vendor Evaluation Process

Evaluating the security posture of third-party vendors can sometimes devolve into a cumbersome process of distributing security questionnaires, pestering vendors for data and then manually combing through responses to determine overall risk. In this Ask-an-Expert live interaction, IANS Faculty Adam Ely suggests ways to streamline the process.

Read More »