Beaver: Learning the Right Lessons from ExpensiveWall Android Malware
If you're in charge of information security, you may not be able to control every user and every device in your environment, but you can...
Van Wyk: Doing Your IR Planning the Right Way
In light of the Equifax breach, organizations need to re-examine their incident response planning to ensure similar crises are handled...
Poulin: The Economics of IoT Fear and Uncertainty
Information- (and now device-) security is an underappreciated field. It’s anti-climactic and difficult to justify the cost of...
October 12, 2017 | Threat Intelligence and ModelingBy Dave Shackleford, IANS Faculty
— CLIENT PORTAL —>
Please Login to continue
Take a Threat Modeling Approach to Protecting Critical IoT Infrastructure
Mark Clancy on the Petya-like GoldenEye Attacks and Tough Choices in Enterprise Defense
| Faculty Report
Beef Up Your Threat Intelligence By Leveraging Internal Success