Results ordered by term relevance.

June 10, 2016 | Incident Response Planning
By Ken Van Wyk, IANS Faculty

 Keeping it Real: Tips for Turbocharging Your Incident Response Prep

Well-rounded incident-response processes can greatly reduce operational disruptions resulting from security incidents. But incident-response protocols are only as good as the people, processes and tools involved. In this webinar, IANS Faculty Ken van Wyk shows you how to get your security teams in shape to defend the organization through relevant, real-world incident-response exercises.

Read More »


March 2, 2017 | Malware and Advanced Threats
By Ken Van Wyk, IANS Faculty

 Fake News: Fighting a Rampant Malware Delivery Mechanism

Due to its unprecedented success during the recent presidential election, fake news is increasingly being adopted by hackers as an elegant malware delivery mechanism, on par with spear-phishing email. In this report, IANS Faculty Ken Van Wyk details how fake news can be weaponized and offers some concrete steps to protect your company.

Read More »


August 23, 2016 | Intrusion Prevention/Detection (IPS/IDS)
By Dave Kennedy, IANS Faculty

 Detailing the Benefits of Network- and Host-Based IDS/IPS Solutions

Both network- and host-based IDS solutions are critical for organizations when it comes to quickly identifying threats. In this Ask-an-Expert written response, IANS Faculty Dave Kennedy breaks down the advantages and limitations of each and offers recommendations for organizations to get the most out of their IDS/IPS solutions.

Read More »


November 22, 2016 | Embedded Systems and Internet of Things
By Chris Poulin, IANS Faculty

 Mirai Defense: Detecting IoT Devices on the Network

The recent Mirai botnet that took down DNS provider Dyn underscored the risks associated with unmanaged, unsecured Internet-of-Things (IoT) devices. In this Ask-an-Expert live interaction, IANS Faculty Chris Poulin explains how to discover/detect rogue IoT devices on the network and track them over time

Read More »


October 18, 2016 | Mainframe and Legacy Systems
By Philip Young, IANS Faculty

 Mainframes, APIs and the False Sense of Security

Mainframes usually hold companies’ most sensitive, mission-critical data. As more organizations decide to open up their mainframe “crown jewels” to participate in today’s mobile/cloud world, however, is mainframe security keeping up? In this report, IANS Faculty Philip Young details the riskiest areas of the mainframe and explains how best to secure them against today’s threats.

Read More »