Poulin: The Economics of IoT Fear and Uncertainty
Information- (and now device-) security is an underappreciated field. It’s anti-climactic and difficult to justify the cost of...
Beaver: Address Security Opportunities or Remain on the Path to Mediocrity
In every organization, there are obstacles and challenges that IT and security professionals have to overcome in order to get their work...
Van Wyk: Don't Just Write Your IR Plans, Test Them
Responding to information security crises is far more than a technical task. It involves close coordination and communication with people...
June 28, 2017 | Incident Investigations, Handling and TrackingBy Chris Gonsalves, IANS Director of Technology Research
IANS Faculty Mark Clancy hops on the broadcast this week for a no-nonsense analysis of this week's global Petya-like ransomware attack. Mark brings his decades of experience as a security consultant, enterprise defender and threat intelligence expert to this discussion of the evolution of cyber-weapons, the limitations of real-time incident response and the tough choices teams make to balance protections and productivity.
IR Playbook: Take the Right Steps After a Firewall Breach
Phishing Stories From the Wild
The Equifax Breach: What Happened and What to Do About It
| Faculty Report
Build and Manage a Holistic Anti-Phishing Program