Results ordered by term relevance.

November 10, 2016 | Converged Infrastructure
By Aaron Turner, IANS Faculty

 Bluetooth Security Risks: An Overview

When it comes to evaluating Bluetooth security risks, it's important to divide up the technology into different sections and examine the potential risks of each. In this Ask-an-Expert written response, IANS Faculty Aaron Turner evaluates Bluetooth security from the perspectives of physical-layer, protocol implementation and application-layer vulnerabilities.

Read More »


September 29, 2016 | Threat Intelligence and Modeling
By Aaron Turner, IANS Faculty

 Breaking Down Cyber Threat Trends in Mexico

For organizations that operate in Mexico and Latin America, it's important to keep tabs on the current cyberthreat trends taking hold in these countries. In this live Ask-an-Expert response, IANS Faculty Aaron Turner details the current threat landscape in Mexico and Latin America, from ATM attacks to state-sponsored cybercrime.

Read More »


September 29, 2016 | Privileged Access Management
By Aaron Turner, IANS Faculty

 Using a Bastion Forest for Privileged Account Management in Microsoft AD Environments

In Microsoft Active Directory (AD) environments, a bastion forest can be used to both reliably manage privileged access and recover a compromised AD implementation. In this report, IANS Faculty Aaron Turner explains the theory behind the bastion forest and steps you through the process of setting one up. He also explains how some organizations may be able to use a bastion forest as a cost-effective alternative to pricier privileged access management (PAM) tools.

Read More »


September 28, 2016 | Networking and Network Devices
By Aaron Turner, IANS Faculty

 Preparing for a DDoS Attack

When it comes to preparing for and responding to DDoS attacks, there is no one-size-fits-all approach. In this Ask-an-Expert written response, IANS Faculty Aaron Turner breaks down the different types of DDoS attack and offers a number of strategies and tools that organizations can lean on to better prepare for them.

Read More »


June 30, 2016 | Encryption, Digital Signatures, Certificates, Tokenization
By Aaron Turner, IANS Faculty

 Encrypting Data at Rest With Pre-Boot Authentication

When it comes to encrypting data at rest on a laptop or desktop, enterprises can choose to employ software-, hardware- or user-driven pre-boot authentication (PBA) methods. In this Ask-an-Expert written response, IANS Faculty Aaron Turner details each approach and explains why using Trusted Platform Modules (TPMs) is likely the most effective strategy.

Read More »


June 14, 2016 | Authentication
By Aaron Turner, IANS Faculty

 Assessing Biometrics as an Authentication Method

The adoption of biometrics as a means of authentication has experienced fluctuating popularity in recent years. In this Ask-an-Expert written response, IANS Faculty Aaron Turner details the current state of the biometrics space and explains why biometric identification is best used as a secondary authentication method.

Read More »


June 13, 2016 | Virtual Private Networks
By Aaron Turner, IANS Faculty

 Managing the Risks of Remote Access

Providing remote access to employees can present a host of potential security challenges. In this Ask-an-Expert written response, IANS Faculty Aaron Turner details the approaches companies can take to provide their employees with secure remote access and explains that costs and resources will ultimately dictate which path to take.

Read More »


January 25, 2017 | Mobile Access and Device Management
By Aaron Turner, IANS Faculty

 Preventing Phishing on Mobile Devices

Phishing attacks happen on every platform, but few anti-phishing tools are available for mobile. In this Ask-an-Expert live interaction, IANS Faculty Aaron Turner suggests some network-based controls that can help reduce the risk and underscores the need for mobile-focused user awareness training.

Read More »


February 8, 2017 | Single Sign-on
By Aaron Turner, IANS Faculty

 Single Sign-On Platform Comparison

The identity and access management market is undergoing significant upheaval due to past under-investment in the space. In this Ask-an-Expert written response, IANS Faculty Aaron Turner offers a breakdown of the single sign-on (SSO) solution marketplace and provides recommendations for selecting a platform. 

Read More »


February 28, 2017 | Privacy
By Aaron Turner, IANS Faculty

 Protecting Data Transferred From Canada

While Canadian regulators in the past typically followed U.S. precedent on data protection standards, the country has moved closer toward the EU model over the past few years. In this Ask-an-Expert written response, IANS Faculty Aaron Turner recommends companies handling Canadian citizen data follow the EU General Data Protection and offers some technical guidance for implementing the necessary controls. 

Read More »


March 13, 2017 | Single Sign-on
By Aaron Turner, IANS Faculty

 Assessing the Pros and Cons of IdentityServer

When evaluating single sign-on (SSO) solutions, it's important to examine a number of factors, including scalability, features, ease-of-use and cost. In this Ask-an-Expert written response, IANS Faculty Aaron Turner examines some of the pros and cons of IdentityServer as an SSO platform and compares it against other popular solutions such as ForgeRock and Active Directory Federation Services. 

Read More »


March 16, 2017 | Embedded Systems and Internet of Things
By Aaron Turner, IANS Faculty

 Balancing Business Benefits with IoT Dangers

Some say IoT stands for Internet of Threats, but businesses and consumers are rushing headlong into the adoption of everything from wearables to smart buildings. In this report, IANS Faculty Aaron Turner examines the enterprise risks of IoT and explores defensive tactics to help build a short- and long-term strategy to effectively and securely employ IoT technology. 

Read More »


March 22, 2017 | Mobile Access and Device Management
By Aaron Turner, IANS Faculty

 Enterprise Mobility: Defining a Security Strategy

Enterprises today are on their third generation of mobile technologies, and each iteration has had its own unique challenges. In this Ask-an-Expert written response, IANS Faculty Aaron Turner details some of the highest-impact risks organizations face in the mobility space today and offers some maturity-specific approaches companies can take to combat these risks. 

Read More »


January 4, 2017 | Regulations & Legislation
By Daniel Maloof, IANS Managing Editor

 Trump and Security: What to Expect in the New Administration

We all know incoming U.S. President Donald Trump is focused on physical security and building the wall, but what about cybersecurity policy? In this report, a handful of IANS Faculty detail what they believe we should expect from the new Donald Trump administration in terms of digital privacy, consumer protections, the EU-U.S. Privacy Shield, the U.S. Cybersecurity Framework and more.

Read More »


January 12, 2017 | Malware and Advanced Threats
By Mike Saurbaugh, IANS Faculty

 IANS Vulnerability and Breach Update: Q4 2016

A new vulnerability or breach seems to be discovered daily, but which should be taken more seriously and which are overhyped? In this report, IANS Faculty Mike Saurbaugh looks back over the major breaches and vulnerabilities of the past three months, explains them and provides real-world context and perspective.

Read More »