Results ordered by term relevance.

November 10, 2016 | Converged Infrastructure
By Aaron Turner, IANS Faculty

 Bluetooth Security Risks: An Overview

When it comes to evaluating Bluetooth security risks, it's important to divide up the technology into different sections and examine the potential risks of each. In this Ask-an-Expert written response, IANS Faculty Aaron Turner evaluates Bluetooth security from the perspectives of physical-layer, protocol implementation and application-layer vulnerabilities.

Read More »


January 25, 2017 | Mobile Access and Device Management
By Aaron Turner, IANS Faculty

 Preventing Phishing on Mobile Devices

Phishing attacks happen on every platform, but few anti-phishing tools are available for mobile. In this Ask-an-Expert live interaction, IANS Faculty Aaron Turner suggests some network-based controls that can help reduce the risk and underscores the need for mobile-focused user awareness training.

Read More »


February 8, 2017 | Single Sign-on
By Aaron Turner, IANS Faculty

 Single Sign-On Platform Comparison

The identity and access management market is undergoing significant upheaval due to past under-investment in the space. In this Ask-an-Expert written response, IANS Faculty Aaron Turner offers a breakdown of the single sign-on (SSO) solution marketplace and provides recommendations for selecting a platform. 

Read More »


February 28, 2017 | Privacy
By Aaron Turner, IANS Faculty

 Protecting Data Transferred From Canada

While Canadian regulators in the past typically followed U.S. precedent on data protection standards, the country has moved closer toward the EU model over the past few years. In this Ask-an-Expert written response, IANS Faculty Aaron Turner recommends companies handling Canadian citizen data follow the EU General Data Protection and offers some technical guidance for implementing the necessary controls. 

Read More »


March 13, 2017 | Single Sign-on
By Aaron Turner, IANS Faculty

 Assessing the Pros and Cons of IdentityServer

When evaluating single sign-on (SSO) solutions, it's important to examine a number of factors, including scalability, features, ease-of-use and cost. In this Ask-an-Expert written response, IANS Faculty Aaron Turner examines some of the pros and cons of IdentityServer as an SSO platform and compares it against other popular solutions such as ForgeRock and Active Directory Federation Services. 

Read More »


March 16, 2017 | Embedded Systems and Internet of Things
By Aaron Turner, IANS Faculty

 Balancing Business Benefits with IoT Dangers

Some say IoT stands for Internet of Threats, but businesses and consumers are rushing headlong into the adoption of everything from wearables to smart buildings. In this report, IANS Faculty Aaron Turner examines the enterprise risks of IoT and explores defensive tactics to help build a short- and long-term strategy to effectively and securely employ IoT technology. 

Read More »


March 22, 2017 | Mobile Access and Device Management
By Aaron Turner, IANS Faculty

 Enterprise Mobility: Defining a Security Strategy

Enterprises today are on their third generation of mobile technologies, and each iteration has had its own unique challenges. In this Ask-an-Expert written response, IANS Faculty Aaron Turner details some of the highest-impact risks organizations face in the mobility space today and offers some maturity-specific approaches companies can take to combat these risks. 

Read More »


March 28, 2017 | Mobile Access and Device Management
By Aaron Turner, IANS Faculty

 Geo-blocking Certain Mobile Device Functionality

Since high-capability mobile devices were first introduced, enterprises have wanted to deploy controls to limit the use of certain functions on these devices in sensitive locations. In this Ask-an-Expert written response, IANS Faculty Aaron Turner details the two major components of a comprehensive smartphone security control system and describes the process for implementing them. 

Read More »


March 29, 2017 | Encryption, Digital Signatures, Certificates, Tokenization
By Aaron Turner, IANS Faculty

 Choosing the Right MFA and PKI Solution for a Complex, High-Security Environment

Leveraging multi-factor authentication (MFA) and public key infrastructure (PKI) across a large organization with multiple domains and trust levels can get complicated fast. In this Ask-an-Expert written response, IANS Faculty Aaron Turner goes over all the options and offers advice for minimizing cost, effort, lifecycle management and security issues.

Read More »


April 26, 2017 | Privileged Access Management
By Aaron Turner, IANS Faculty

 Choosing an IDAM Tool for the Future

Finding one tool to handle both identity and privileged identity management is difficult enough, but what about one that will also provide the right set of capabilities as identity needs evolve in the future? In this Ask-an-Expert written response, IANS Faculty Aaron Turner details how to evaluate current vendors to ensure they remain relevant today and tomorrow.

Read More »


May 10, 2017 | Authentication
By Aaron Turner, IANS Faculty

 Implementing Contactless MFA across a PKI Environment

Implementing contactless multifactor authentication (MFA) across an entire organization is difficult enough, without the added stress of getting it operational by year end to meet the tight deadline of DFARS compliance. In this Ask-an-Expert written response, IANS Faculty Aaron Turner recommends taking a phased approach to ensure a seamless rollout. 

Read More »


May 11, 2017 | Cloud Application and Data Controls
By Aaron Turner, IANS Faculty

 Securing Cloud Assets Using Federated Identities

Whether you view the cloud as infrastructure-, platform- or application-as-a-service, identity is the only control that exists universally across all cloud environments. Unfortunately, identity lifecycle management for cloud-based systems is not as mature as we need it to be. In this report, IANS Faculty Aaron Turner details how to make wise investments in a federated identity strategy that can scale to even the most complex cloud technology models.

Read More »


January 4, 2017 | Regulations & Legislation
By Daniel Maloof, IANS Managing Editor

 Trump and Security: What to Expect in the New Administration

We all know incoming U.S. President Donald Trump is focused on physical security and building the wall, but what about cybersecurity policy? In this report, a handful of IANS Faculty detail what they believe we should expect from the new Donald Trump administration in terms of digital privacy, consumer protections, the EU-U.S. Privacy Shield, the U.S. Cybersecurity Framework and more.

Read More »


January 12, 2017 | Malware and Advanced Threats
By Mike Saurbaugh, IANS Faculty

 IANS Vulnerability and Breach Update: Q4 2016

A new vulnerability or breach seems to be discovered daily, but which should be taken more seriously and which are overhyped? In this report, IANS Faculty Mike Saurbaugh looks back over the major breaches and vulnerabilities of the past three months, explains them and provides real-world context and perspective.

Read More »