Results ordered by term relevance.

October 6, 2016 | Security Policies and Strategy
By Michael Pinch, IANS Faculty

 5 Ways to Improve Security While Cutting Costs

Attacks and malware continually evolve, forcing organizations to react by implementing an ever-expanding tool set. Unfortunately, few budgets expand in kind. In this report, IANS Faculty Michael Pinch details five key ways to immediately improve your organization’s security posture, without breaking the budget.

Read More »


November 2, 2016 | Risk Management
By Michael Pinch, IANS Faculty

 Breaking Down the Top 5 Security Risks Facing Health Care Organizations

The top priorities for health care organizations today are uptime and free access to data, which means companies in this space face a number of security challenges. In this Ask-an-Expert written response, IANS Faculty Mike Pinch details the major security risks the health care industry is dealing with today - from ransomware to the Internet of Things - and offers strategies for tackling these challenges.

Read More »


February 1, 2017 | Authentication
By Michael Pinch, IANS Faculty

 Authenticating Customers via Fingerprint Biometrics

A security team is considering using fingerprint-based biometrics to authenticate customers at its company's retail stores, but what are the pros/cons? In this Ask-an-Expert live interaction, IANS Faculty Mike Pinch details the current state of fingerprint biometrics and offers some advice for safe, cost-effective implementation.

Read More »


November 3, 2016 | Vulnerability Assessment and Management
By Michael Pinch, IANS Faculty

 Vulnerability Patching Policy Best Practices

Patching and vulnerability management can be a highly variable process depending on a number of factors, but there are some basic best practices that organizations can adhere to. In this Ask-an-Expert written response, IANS Faculty Mike Pinch details these best practices for vulnerability scanning and management, including for servers, endpoints and at the application level.

Read More »


March 31, 2017 | DevOps Organization and Strategy
By Michael Pinch, IANS Faculty

 Making Threat Modeling an Integral Part of the Development Process

Threat modeling is a critical part of the mature software delivery process, especially in DevOps environments, but ensuring it's integrated effectively and seamlessly can be tricky. In this Ask-an-Expert written response, IANS Faculty Mike Pinch offers some tips for inserting threat modeling into the development process, along with some key tools to consider.

Read More »


November 3, 2016 | Malware and Advanced Threats
By Michael Pinch, IANS Faculty

 Health Care Roundtable: Tackling Ransomware

Ransomware is a scourge across every vertical but it seems to have found a soft spot in health care. For this roundtable, IANS brought together a group of health care sector security executives to talk about the problems they face and the strategies they are using to get ahead of the ransomware issue.

Read More »


January 4, 2017 | Regulations & Legislation
By Daniel Maloof, IANS Managing Editor

 Trump and Security: What to Expect in the New Administration

We all know incoming U.S. President Donald Trump is focused on physical security and building the wall, but what about cybersecurity policy? In this report, a handful of IANS Faculty detail what they believe we should expect from the new Donald Trump administration in terms of digital privacy, consumer protections, the EU-U.S. Privacy Shield, the U.S. Cybersecurity Framework and more.

Read More »