Van Wyk: Take Steps to Protect Yourself as a Consumer
With all the digital threats we face on a daily basis, it's a miracle we haven't all been hacked. To ensure the odds are in your favor...
Beaver: Learning the Right Lessons from ExpensiveWall Android Malware
If you're in charge of information security, you may not be able to control every user and every device in your environment, but you can...
Van Wyk: Doing Your IR Planning the Right Way
In light of the Equifax breach, organizations need to re-examine their incident response planning to ensure similar crises are handled...
March 10, 2017 | Architecture, Configuration and SegmentationBy Marcus Ranum, IANS Faculty, Ron Dilley, IANS Faculty
Many security practitioners complain about being flooded with alerts and vulnerabilities, because they don't get to design their systems so that the alerts are useful. Segmentation is one of many techniques these practitioners can use to manage alerts and reduce breach
impact. In this webinar, IANS Faculty Marcus Ranum and Ron Dilley describe a model for administratively breaking your network apart into management "zones" that can be analyzed and secured separately.
— CLIENT PORTAL —>
Please Login to continue
Manage SSH and RDP Securely
| Tools & Templates
Internal Network Monitoring Solution Request-for-Proposal (RFP) Template
Know Your Terms: Defining Enclaving, Zero Trust, Microsegmentation and More
Why Jump Servers Are Important