home_banner

Insights Portal

The IANS Insights Portal contains thousands of research articles, Ask-An-Expert responses, Tools & Templates, Executive Communications materials, Content Aggregator updates and IANS event takeaways. Here you will find a collection of anonymized case studies and real-world examples containing tangible, actionable advice to help you address your organization's challenges.

Not an IANS client?

Interested in what’s included in the Insights Portal and how to find what you need? Watch our Product Overview and Technical Demo below!

Welcome Image
Technical Image
Download Sample Content

Are you an existing client?

If you already have credentials, sign in below.

Selected Filters:

1705

Results

Filter Options: 
  • Product: IANS content served in various formats (i.e. Ask-An-Expert Writeups, Faculty Reports, *Content Aggregator)
    • *Content Aggregator: Third-party content formatted in ready-to-use slides for presentations to the C-suite and lines of business
      • Single Slides: PowerPoint slides including speaker notes
      • Compilations: Collections of single slides on specific information security topics
      • Executive Briefings: Topical slides with an added viewpoint from the IANS Faculty
      • Icon Library: A collection of cybersecurity themed icons ready to use in slideshows
  • Topic: Primary and secondary IANS taxonomies (i.e. Cloud Computing, Infrastructure, Management & Leadership)
  • Author: Creator of a piece of content (i.e. particular IANS Faculty member)
Topic Guides icon
Pinned Topic Guides

COVID-19 and InfoSec: What You Need to Know

The ramifications of the novel coronavirus  COVID-19  are being felt throughout the business and information security communities. Here we offer a compilation of the latest IANS research to help you stay ahead of this fast-evolving situation and keep your staff and businesses safe and productive.

Faculty Reports icon
Faculty Reports

IANS Vulnerability and Breach Update: Q2 2020

In this quarterly research report, IANS updates clients on the top vulnerabilities and breaches from the past quarter and provides some real-world context and perspective.

Ask-An-Expert Writeups icon
Ask-An-Expert Writeups

Make the Shift from a Flat to a Segmented Network

Moving from a flat topology to a zoned network takes organization and analysis, but it can dramatically improve an organization’s security. This report helps steps you through the process.

Faculty Reports icon
Faculty Reports

IANS Cloud Security Update: Q2 2020

As organizations continue to move services and computing assets into cloud service provider environments, the need for adequate security controls grows as well. This quarterly research report updates IANS’ clients on the new developments occurring in the cloud security arena.

Ask-An-Expert Writeups icon
Ask-An-Expert Writeups

Provide Granular IAM Access/Roles to Kubernetes Pods in AWS

AWS grants permissions to use its resources at the EC2 instance level, not the Kubernetes pod level. This report details ways to get around the issue and ensure your pods support least privilege. 

Content Aggregator icon
Content Aggregator

Executive Cyber Briefing: Protecting Against Insider Threats

Insider threats are users (employees) with legitimate access to corporate networks who unintentionally or maliciously subvert IT infrastructure to move funds, steal IP, damage systems or wreak havoc. IANS recommends 7 steps to protect against these threats.

Ask-An-Expert Writeups icon
Ask-An-Expert Writeups

Secure MongoDB in the Cloud

To secure MongoDB within Google Cloud Platform (GCP) or any other cloud provider environment, users must follow MongoDB's STIG recommendations in addition to CIS benchmarks. This report lists the main control areas to focus on. 

Content Aggregator icon
Content Aggregator

Overview of Significant Ransomware Incidents 2019-2020

Some of the most impactful ransomware attacks over the past year targeted Travelex, LifeLabs, the city of Baltimore and Norsk Hydro.

Ask-An-Expert Writeups icon
Ask-An-Expert Writeups

Best Practices for Whitelisting Using FQDN and Wildcard Domains

This report explains the pros and cons of both IP- and DNS-based approaches to whitelisting and offers guidance to implement an efficient, secure whitelisting process.

Content Aggregator icon
Content Aggregator

2019 Global Data Breach Trends

In 2019, 86% of breaches were financially motivated, 43% involved web applications, and 37% stole or used credentials. More than a quarter (27%) of malware incidents involved ransomware, and 22% of breaches involved phishing.

Interested in learning more about the Portal?

Provide us with your information and an IANS team member will reach out.

* Required Fields