Results ordered by term relevance.

October 4, 2016 | Data Breaches
By Mike Saurbaugh, IANS Faculty

 IANS Vulnerability and Breach Update: Q3 2016

A new vulnerability or breach seems to be discovered daily, but which should be taken more seriously and which are overhyped? In this report, IANS Faculty Mike Saurbaugh looks back over the major breaches and vulnerabilities of the past three months, explains them and provides real-world context and perspective.

Read More »


October 3, 2016 | Cloud Network and Host Controls
By Dave Shackleford, IANS Faculty

 IANS Cloud Security Update: Q3 2016

As more organizations move services and computing assets into cloud service provider environments, the need for adequate security controls grows as well. In this quarterly research report, IANS Faculty Dave Shackleford updates IANS’ clients on the new developments occurring in the cloud security arena.

Read More »


July 7, 2016 | Vulnerability Assessment and Management
By Mike Saurbaugh, IANS Faculty

 IANS Vulnerability and Breach Update: Q2 2016

A new vulnerability or breach seems to be discovered daily, but which should be taken more seriously and which are overhyped? In this report, IANS Faculty Mike Saurbaugh looks back over the major breaches and vulnerabilities of the past three months, explains them and provides real-world context and perspective. 

Read More »


July 5, 2016 | Cloud Network and Host Controls
By Dave Shackleford, IANS Faculty

 IANS Cloud Security Update: Q2 2016

As more organizations move services and computing assets into cloud service provider environments, the need for adequate security controls grows as well. In this quarterly research report, IANS Faculty Dave Shackleford updates clients on the new developments occurring in the cloud security arena. 

Read More »


January 6, 2017 | Cloud Application and Data Controls
By Dave Shackleford, IANS Faculty

 IANS Cloud Security Update: Q4 2016

As more organizations move services and computing assets into cloud service provider environments, the need for adequate security controls grows as well. In this quarterly research report, IANS Faculty Dave Shackleford updates IANS’ clients on the new developments occurring in the cloud security arena.

Read More »


January 12, 2017 | Malware and Advanced Threats
By Mike Saurbaugh, IANS Faculty

 IANS Vulnerability and Breach Update: Q4 2016

A new vulnerability or breach seems to be discovered daily, but which should be taken more seriously and which are overhyped? In this report, IANS Faculty Mike Saurbaugh looks back over the major breaches and vulnerabilities of the past three months, explains them and provides real-world context and perspective.

Read More »


August 15, 2016 | Threat Intelligence and Modeling
By Michael Pinch, IANS Faculty

 IANS Pragmatic Threat Modeling

IT Security has long been a practitioner of traditional risk assessments, but threat modeling brings an entirely new, attacker-centric view of your systems. Threat modeling methodologies have been around in many forms, but until now, there hasn't been a simple and time-effective way to operationalize them. In this webinar, IANS Faculty Mike Pinch delves into the IANS Pragmatic Threat Modeling Toolkit, designed to help jumpstart and evolve your organization's risk management efforts.

Read More »


December 9, 2016 | Risk Management
By Rich Guida, IANS Faculty

 Understanding the Relationship Between Physical and Logical Information Security

The relationship between physical security and cybersecurity can be more closely linked than some organizations might think. In this Ask-an-Expert written response, IANS Faculty Rich Guida details specific instances (i.e., insider threats) where the two types of security come together and offers insight into the practice of "incrementalism."

Read More »


November 28, 2016 | Embedded Systems and Internet of Things
By Chris Poulin, IANS Faculty

 Hidden Threats in Smart Buildings

In a quest to reduce energy consumption and make daily activities more convenient and pleasant for their occupants, smart buildings are becoming ever more interconnected, internet-connected and complex. In this report, IANS Faculty Chris Poulin details the latest advances in smart building technologies, the hidden threats they expose and key steps to take to ensure your smart building doesn’t become your latest threat vector.

Read More »


November 22, 2016 | Embedded Systems and Internet of Things
By Chris Poulin, IANS Faculty

 Mirai Defense: Detecting IoT Devices on the Network

The recent Mirai botnet that took down DNS provider Dyn underscored the risks associated with unmanaged, unsecured Internet-of-Things (IoT) devices. In this Ask-an-Expert live interaction, IANS Faculty Chris Poulin explains how to discover/detect rogue IoT devices on the network and track them over time

Read More »


November 21, 2016 | Application Development and Testing
By Jason Gillam, IANS Faculty

 Secure Development Practices for Mobile Applications

Best practices around the secure development of mobile applications are still evolving because of the rapid evolution of the mobile platforms themselves. In this Ask-an-Expert written response, IANS Faculty Jason Gillam outlines the key differences between the secure development of mobile and web applications, and details standard accepted practices around encryption and authentication.

Read More »


November 18, 2016 | Team Structure and Management
By Dave Shackleford, IANS Faculty

 Security Operations Maturity Chart

For security organizations, understanding where you stand from a maturity perspective can offer valuable insight into which processes and procedures need to be improved. In this Ask-an-Expert written response, IANS Faculty Dave Shackleford charts benchmarks for certain aspects within information security, from event detection and incident management to metrics and data visualization

Read More »


November 14, 2016 | Data Classification
By Kevin Beaver, IANS Faculty

 Where, Exactly, Is Your Information?

Do you know where all of your critical data is located? Studies show that few information security pros do. In this report, IANS Faculty Kevin Beaver underscores the importance of data classification and offers tips to not only find exactly where sensitive information is located, but establish the right controls to ensure you always know where it is and that it’s secured effectively.

Read More »


November 14, 2016 | Endpoints
By Dave Shackleford, IANS Faculty

 Endpoint Protection: Burn and Churn

Malware containment has devolved into an arms race, with a steady stream of solutions and rapidly evolving new problems, leaving IT security struggling to keep up and make sense of it all. In this webinar, IANS Faculty Dave Shackleford examines the new players and techniques in the space, and reviews some of the tried-and-true strategies, including whitelisting, sandboxing, segmentation and configuration management.

Read More »


November 10, 2016 | Converged Infrastructure
By Aaron Turner, IANS Faculty

 Bluetooth Security Risks: An Overview

When it comes to evaluating Bluetooth security risks, it's important to divide up the technology into different sections and examine the potential risks of each. In this Ask-an-Expert written response, IANS Faculty Aaron Turner evaluates Bluetooth security from the perspectives of physical-layer, protocol implementation and application-layer vulnerabilities.

Read More »


November 7, 2016 | Malware and Advanced Threats
By Adam Ely, IANS Faculty

 Protecting Against the Latest Wave of DDoS Attacks

Now that Internet-of-Things (IoT)-based DDoS attacks are in the news, is it time to rethink your DDoS strategy? In this Ask-an-Expert live interaction, IANS Faculty Adam Ely outlines key strategies to implement at the network, server and operations level to defend against all types of DDoS attacks, even this latest iteration.

Read More »


November 7, 2016 | Vendor and Partner Management
By Marty Gomberg, IANS Faculty

 Identifying Vendor Risk Red Flags

When it comes to evaluating vendors, there are a number of factors organizations need to keep in mind, from integration costs to uptime guarantees. In this Ask-an-Expert written response, IANS Faculty Martin Gomberg lays out some of the major red flags organizations should look out for when evaluating vendors, from the due diligence phase to the questionnaire process.

Read More »


October 31, 2016 | Application Development and Testing
By Jason Gillam, IANS Faculty

 Application-Level DoS: Are You Ready?

Application-level DoS attacks can be difficult to detect, challenging to diagnose, and when effectively exploited, they can render your application completely inaccessible. In this report, IANS Faculty Jason Gillam explains how application-level DoS works and offers some key mitigation strategies. 

Read More »


October 27, 2016 | Insider Threats
By John Strand, IANS Faculty

 Going from Reactive to Proactive with Insider Threats

Honing your response to an insider threat is difficult enough, but building on the program to proactively identify and thwart potential malicious insiders is fraught with risk. In this Ask-an-Expert live interaction, IANS Faculty John Strand outlines the importance of partnering with HR, choosing the right tool set and funding the program adequately.

Read More »


October 20, 2016 | Encryption, Digital Signatures, Certificates, Tokenization
By Dave Shackleford, IANS Faculty

 Assessing Key Management Services Within AWS

There are a number of key management tools and services that organizations can use within the AWS cloud. In this Ask-an-Expert written response, IANS Faculty Dave Shackleford breaks down some of the major players in the space, including Amazon's own key management service, HyTrust DataControl and Vault.

Read More »


October 20, 2016 | Cloud Network and Host Controls
By Dave Shackleford, IANS Faculty

 Securing Hybrid Clouds

Hybrid clouds offer organizations the ultimate in flexibility, enabling IT to keep sensitive workloads in-house while taking advantage of the efficiencies and scalability of public clouds for everything else. But how secure is the setup? In this report, IANS Faculty Dave Shackleford steps you through the challenges of securing hybrid clouds and provides advice to ensure workloads remain secure, no matter where they are run.

Read More »


October 18, 2016 | Mainframe and Legacy Systems
By Philip Young, IANS Faculty

 Mainframes, APIs and the False Sense of Security

Mainframes usually hold companies’ most sensitive, mission-critical data. As more organizations decide to open up their mainframe “crown jewels” to participate in today’s mobile/cloud world, however, is mainframe security keeping up? In this report, IANS Faculty Philip Young details the riskiest areas of the mainframe and explains how best to secure them against today’s threats.

Read More »


October 13, 2016 | Networking and Network Devices
By Mike Saurbaugh, IANS Faculty

 What to Look for in a Secure Web Gateway

Secure web gateways provide a staple in network infrastructure and the market seems to suggest they will be around for the next few years. In this Ask-an-Expert written response, IANS Faculty Mike Saurbaugh explores the capabilities of modern proxy solutions and offers selection criteria to help evaluate various solutions.

Read More »


October 6, 2016 | Security Policies and Strategy
By Michael Pinch, IANS Faculty

 5 Ways to Improve Security While Cutting Costs

Attacks and malware continually evolve, forcing organizations to react by implementing an ever-expanding tool set. Unfortunately, few budgets expand in kind. In this report, IANS Faculty Michael Pinch details five key ways to immediately improve your organization’s security posture, without breaking the budget.

Read More »


October 1, 2016 | Risk Management
By Rich Guida, IANS Faculty

 Best Practices for Risk Registers

When it comes to building a risk register, there are a number of important steps organizations must take. In this Ask-an-Expert written response, IANS Faculty Rich Guida details the process of constructing a risk register and offers specific criteria for determining how accurate and successful it is.

Read More »


September 29, 2016 | Threat Intelligence and Modeling
By Aaron Turner, IANS Faculty

 Breaking Down Cyber Threat Trends in Mexico

For organizations that operate in Mexico and Latin America, it's important to keep tabs on the current cyberthreat trends taking hold in these countries. In this live Ask-an-Expert response, IANS Faculty Aaron Turner details the current threat landscape in Mexico and Latin America, from ATM attacks to state-sponsored cybercrime.

Read More »


September 29, 2016 | Cloud Application and Data Controls
By Dave Shackleford, IANS Faculty

 Detailing Security Controls For Office 365

When deploying Office 365, organizations need to take a number of steps to ensure they are implementing the proper security controls as well. In this Ask-an-Expert written response, IANS Faculty Dave Shackleford explains the core security controls and settings that should be implemented, including configuring TLS encryption connectors for mail and enabling content searches for e-discovery.

Read More »


September 29, 2016 | Privileged Access Management
By Aaron Turner, IANS Faculty

 Using a Bastion Forest for Privileged Account Management in Microsoft AD Environments

In Microsoft Active Directory (AD) environments, a bastion forest can be used to both reliably manage privileged access and recover a compromised AD implementation. In this report, IANS Faculty Aaron Turner explains the theory behind the bastion forest and steps you through the process of setting one up. He also explains how some organizations may be able to use a bastion forest as a cost-effective alternative to pricier privileged access management (PAM) tools.

Read More »


September 28, 2016 | Networking and Network Devices
By Aaron Turner, IANS Faculty

 Preparing for a DDoS Attack

When it comes to preparing for and responding to DDoS attacks, there is no one-size-fits-all approach. In this Ask-an-Expert written response, IANS Faculty Aaron Turner breaks down the different types of DDoS attack and offers a number of strategies and tools that organizations can lean on to better prepare for them.

Read More »


September 23, 2016 | Recruiting, Hiring and Retention
By Adam Ely, IANS Faculty

 Building and Staffing a Winning Security Team

The fierce competition for skilled, experienced security practitioners has made the infosec talent shortage a top concern for security leaders. How do you assemble a world-class team in such a withering environment? In this webinar, IANS Faculty Adam Ely shares key hiring and retention strategies to help you out-recruit your competitors and keep the all-star players you need to win.

Read More »


September 21, 2016 | Insider Threats
By Bill Dean, IANS Faculty

 Insider Threats: Understanding the Risks

Insider threats can often pose a greater risk to an organization than external actors. In this Ask-an-Expert written response, IANS Faculty Bill Dean offers some key statistics regarding insider threats and provides a number of steps organizations can take to anticipate and prepare for the risks posed by insiders.

Read More »


September 12, 2016 | Risk Management
By Adam Ely, IANS Faculty

 IT Governance Everyone Can Live With

Building a quality, efficient, multi-entity governance, risk and compliance (GRC) structure that doesn’t slow business units and allows for consistent and effective risk mitigation is hard but achievable. In this report, IANS Faculty Adam Ely explains how to determine costs, handle staffing and empower stakeholders to create a GRC program that efficiently mitigates risk and garners support from line-of-business leaders.

Read More »


September 1, 2016 | Software Development Lifecycle (SDLC)
By Jason Gillam, IANS Faculty

 Ensuring a PCI-Compliant SDLC Review Process

Establishing a review process for PCI DSS compliance is something organizations should do in a strategic, ongoing fashion, rather than as a once-per-year activity. In this Ask-an-Expert written response, IANS Faculty Jason Gillam details the Building Security in Maturity Model (BSIMM) and demonstrates how organizations can consult this framework to build a continuous compliance review process within the software development lifecycle.

Read More »


August 26, 2016 | Cloud Application and Data Controls
By George Gerchow, IANS Faculty

 Securing Microsoft Office 365 and OneDrive for Mobile Access

Moving to Office 365 and other cloud applications presents both security and compliance challenges. In this Ask-an-Expert live interaction, IANS Faculty George Gerchow recommends using a CASB, together with Microsoft's own DLP and SharePoint data classification schemes to keep corporate data safe while easing access for mobile and cloud users.

Read More »


August 23, 2016 | Intrusion Prevention/Detection (IPS/IDS)
By Dave Kennedy, IANS Faculty

 Detailing the Benefits of Network- and Host-Based IDS/IPS Solutions

Both network- and host-based IDS solutions are critical for organizations when it comes to quickly identifying threats. In this Ask-an-Expert written response, IANS Faculty Dave Kennedy breaks down the advantages and limitations of each and offers recommendations for organizations to get the most out of their IDS/IPS solutions.

Read More »


August 22, 2016 | Security Analytics and Visualization
By Dave Shackleford, IANS Faculty

 Assessing Tools for Data Lineage Visualization

Most tools for performing data lineage visualization fall into one of two categories: data analytics processing or fraud analytics. In this Ask-an-Expert written response, IANS Faculty Dave Shackleford details the top analytics processing and visualization tools, including some open-source options that can be used to analyze large quantities of logs and events.

Read More »


August 18, 2016 | Security Awareness, Phishing, Social Engineering
By Kevin Beaver, IANS Faculty

 CEO Spoofing: Don't Get Fooled!

Austrian aerospace firm FACC fired its CEO after losing nearly €50 million when fraudsters posing as the CEO forced the finance department to approve multimillion dollar payments. In this report, IANS Faculty Kevin Beaver explains how such scams work and offers tips to ensure your company doesn’t become the next victim.

Read More »


August 15, 2016 | Incident Response Planning
By Bill Dean, IANS Faculty

 Creating Effective Tabletop Exercises

Designed correctly, tabletop exercises can help you determine how well your people, processes and technologies are prepared for an incident – and improve that preparation over time. In this report, IANS Faculty Bill Dean steps you through the process of designing, planning and executing effective tabletop exercises. 

Read More »


August 9, 2016 | Security Analytics and Visualization
By Dave Shackleford, IANS Faculty

 User Behavior Analytics: A Tools Overview

Over the past few years, a number of organizations have begun to implement a user behavior analytics program in an effort to combat things like insider threats. In this live Ask-an-Expert interaction with the security team at a large financial services organization, IANS Faculty Dave Shackleford assesses the current landscape of user behavior analytics tools and offers tips and pitfalls to consider when implementing such a program.

Read More »


August 9, 2016 | Team Structure and Management
By Rich Guida, IANS Faculty

 Prioritizing Risk to Manage the Security Team’s Workload

When it comes to managing the workload of the security team (particularly if it only has a few members), prioritizing organizational risks is an important first step. In this Ask-an-Expert written response, IANS Faculty Rich Guida offers tips for developing a true risk register, compiling critical metrics and getting the various business units to own risks.

Read More »


August 2, 2016 | IT Asset Disposal (ITAD)
By Chris Poulin, IANS Faculty

 IT Asset Management Tools and Best Practices

IT asset management is an ongoing process that requires continual maintenance and dedicated resources. In this Ask-an-Expert written response, IANS Faculty Chris Poulin provides an overview of the tools required for building and tracking an inventory, and offers best practices for managing an organization's physical and virtual assets.

Read More »


July 21, 2016 | Penetration Testing and Red Teaming
By Bill Dean, IANS Faculty

 Examining Top Penetration Testing Tools

As the features and functionality of vulnerability assessment and penetration tools continue to evolve, a number of vendors have begun to enter the spaces. In this Ask-an-Expert written response, IANS Faculty Bill Dean details the various open-source and commercial tools available and offers factors to consider for choosing the most effective solutions. 

Read More »


July 21, 2016 | Enterprise and IT Compliance Management
By Adam Ely, IANS Faculty

 Keeping Compliant With PCI After Certification

Maintaining PCI compliance is a factor of how well you can build ongoing PCI-based tasks into the normal operating processes of your organization. In this Ask-an-Expert written response, IANS Faculty Adam Ely provides a sample PCI compliance task tracking list that organizations can use to describe various PCI tasks and the frequency at which they need to be addressed. 

Read More »


July 20, 2016 | Security Awareness, Phishing, Social Engineering
By Kati Rodzon, IANS Faculty

 Improving Security Awareness Training Through Gamification

Information security is not all fun and games… or is it? More and more, organization are turning to gamification to boost the effectiveness of user security awareness training. In this webinar, IANS Faculty Katrina Rodzon discusses the key behavioral factors for successful gamified security training programs and explains how to set clear expectations for your program, identify user behaviors to target and manipulate the learning curve to maximize results.

Read More »


July 18, 2016 | Encryption, Digital Signatures, Certificates, Tokenization
By Dave Shackleford, IANS Faculty

 The Death of SSL/TLS and Rise of Blockchain: Considering Future Models of Trust

Current trust models that depend on SSL/TLS and certificate authorities were fine for the client/server era, but new modes of trust are required to handle mobile/cloud/IoT. In this report, IANS Faculty Dave Shackleford examines emerging trust models and consider what this new future of trust might look like.

Read More »


June 30, 2016 | Encryption, Digital Signatures, Certificates, Tokenization
By Aaron Turner, IANS Faculty

 Encrypting Data at Rest With Pre-Boot Authentication

When it comes to encrypting data at rest on a laptop or desktop, enterprises can choose to employ software-, hardware- or user-driven pre-boot authentication (PBA) methods. In this Ask-an-Expert written response, IANS Faculty Aaron Turner details each approach and explains why using Trusted Platform Modules (TPMs) is likely the most effective strategy.

Read More »


June 27, 2016 | Cloud Access Security Brokers
By Ed Moyle, IANS Faculty

 Identity as a Service: Deciding When It Makes Sense

As more companies start using cloud services, many are considering identity as a service (IDaaS) to help simplify identity management, but is it a good idea? In this report, IANS Faculty Ed Moyle provides a quick market overview, some common use cases, and tips for deciding when IDaaS can work – and when it can’t.

Read More »


June 17, 2016 | Incident Investigations, Handling and Tracking
By Jason Gillam, IANS Faculty

 Choosing a Vendor For Phishing Awareness Training

Phishing awareness training represents a rapidly growing market within the information security services space. In this Ask-an-Expert written response, IANS Faculty Jason Gillam offers tips for identifying which phishing awareness vendors organizations should avoid and which risks to consider when ultimately making the decision, including security of the vendor, cost and value provided.

Read More »


June 17, 2016 | Firewalls, NGFW
By Dave Shackleford, IANS Faculty

 Understanding AWS Network Security Firewall Requirements

Choosing a firewall to leverage within Amazon Web Services comes with a number of important considerations. In this Ask-an-Expert written response, IANS Faculty Dave Shackleford lists the benefits of using a third-party firewall and details the key factors organizations need to consider when choosing a firewall, including support level, cross-cloud compatibility and, ultimately, cost.

Read More »


June 14, 2016 | Authentication
By Aaron Turner, IANS Faculty

 Assessing Biometrics as an Authentication Method

The adoption of biometrics as a means of authentication has experienced fluctuating popularity in recent years. In this Ask-an-Expert written response, IANS Faculty Aaron Turner details the current state of the biometrics space and explains why biometric identification is best used as a secondary authentication method.

Read More »


June 13, 2016 | Virtual Private Networks
By Aaron Turner, IANS Faculty

 Managing the Risks of Remote Access

Providing remote access to employees can present a host of potential security challenges. In this Ask-an-Expert written response, IANS Faculty Aaron Turner details the approaches companies can take to provide their employees with secure remote access and explains that costs and resources will ultimately dictate which path to take.

Read More »


June 10, 2016 | Incident Response Planning
By Ken Van Wyk, IANS Faculty

 Keeping it Real: Tips for Turbocharging Your Incident Response Prep

Well-rounded incident-response processes can greatly reduce operational disruptions resulting from security incidents. But incident-response protocols are only as good as the people, processes and tools involved. In this webinar, IANS Faculty Ken van Wyk shows you how to get your security teams in shape to defend the organization through relevant, real-world incident-response exercises.

Read More »


June 2, 2016 | Networking and Network Devices
By Marcus Ranum, IANS Faculty

 From Tools to Understanding: Reinventing Security

Let’s face it: Current security practices just aren't working. Patching – and playing whack-a-mole with malware – is an endless, grinding failure. In this report, IANS Faculty Marcus Ranum introduces a completely new model for building secured networks from the ground up and uses real-world examples to show how putting in some hard work upfront can pay big security dividends.

Read More »


May 31, 2016 | Risk Management
By George Gerchow, IANS Faculty

 Creating Archer Dashboards

Gleaning useful data/metrics from Archer dashboards (and leveraging this information) can be a challenge for security teams. In this Ask-an-Expert written response, IANS Faculty George Gerchow recommends taking a phased approach, starting with modules such as Compliance and Vendor Management, in order to generate buy-in from other departments outside of IT.

Read More »


May 26, 2016 | IT Forensics
By Bill Dean, IANS Faculty

 Mobile Device Forensics: A Tools Overview

Mobile device forensics tools in the marketplace today vary greatly in both capability and price. In this Ask-an-Expert written response, IANS Faculty Bill Dean assesses a number of these solutions and explains that budget and the types of mobile phones in your environment are the two main factors for selecting the right forensics tool.

Read More »


May 23, 2016 | Vendor and Partner Management
By Adam Ely, IANS Faculty

 Automating the Vendor Evaluation Process

Evaluating the security posture of third-party vendors can sometimes devolve into a cumbersome process of distributing security questionnaires, pestering vendors for data and then manually combing through responses to determine overall risk. In this Ask-an-Expert live interaction, IANS Faculty Adam Ely suggests ways to streamline the process.

Read More »