Filter By:



Recent Blogs & Podcasts

Insights Portal


February 16, 2018 | Threat Intelligence and Modeling
By Adam Shostack, IANS Faculty

 Comprehensive, Structured and Systematic: Engineering for Security

The hardest part of security is going from random discovery of problems as you create new features to a systematic, comprehensive and structured approach to finding problems early. In this webinar, IANS Faculty Adam Shostack identifies ways to bring security engineering to the very earliest parts of product or service cycles, align with agile practices and reap the benefits that come from such efforts: faster, more predictable and more secure launches.

Read More »

February 15, 2018 | DevOps Organization and Strategy
By Dave Shackleford, IANS Faculty

 Best Practices in Container Security

While many organizations are deploying containers for all kinds of applications, few fully understand - and implement - strong container security today. In this Ask-an-Expert live interaction, IANS Faculty Dave Shackleford recommends ways to secure the underlying platform and ensure the integrity of repositories, in addition to other best practices.

Read More »

February 14, 2018 | Authentication
By Andrew Carroll, IANS Faculty

 Understanding Blockchain‚Äôs Promise for Identity Management

While blockchains were developed to solve problems very different from identity management, some vendors (and enterprises) are beginning to explore how blockchains could be used to both secure and provide more granular control over digital identities. In this report, IANS Faculty Andrew Carroll explains the pros and cons of using blockchains for identity, and provides a practical overview of the vendors addressing the space.  

Read More »

February 13, 2018 | Security Analytics and Visualization
By John Strand, IANS Faculty,
     Aaron Turner, IANS Faculty

 Cut Through the AI/ML Hype

Vendors across the board are touting artificial intelligence and machine learning as the next big thing in security, but how practical is it for today's enterprises? In this Ask-an-Expert live interaction, IANS Faculty John Strand and Aaron Turner discuss the current state of the technology and offer practical ways to assess vendor offerings.

Read More »

February 8, 2018 | Threats & Incidents

 Barriers Preventing Implementation of Data Security Controls/Practices

Concerns about performance and business process impact tops the list of barriers to implementing data security controls (42% globally, 46% U.S.), though complexity is closing the gap. Even the perception that data security is complex remains a top barrier to data security (43% globally, 44% U.S.).

Read More »

February 8, 2018 | Encryption, Digital Signatures, Certificates, Tokenization
By Dave Shackleford, IANS Faculty

 Best Practices in Secrets Management

Keeping secrets like passwords, private SSH keys, certificates and API tokens safe requires more than just a secure data store. In this Ask-an-Expert written response, IANS Faculty Dave Shackleford steps you through the tools and processes for ensuring all your secrets stay secret.

Read More »