Filter By:

Recent Blogs & Podcasts



November 22, 2017 | Data Breaches

 Uber Tries to Cover Up Breach by Paying Hackers to Delete Data

On November 21, 2017, Bloomberg reported that Uber attempted to conceal an October 2016 data breach impacting 57 million customers by paying the hackers $100,000 to delete the stolen data and keep quiet. The compromised data included names, email addresses and phone numbers of 50 million Uber riders around the world, as well as the personal information of 7 million drivers.

Read More »

November 21, 2017 | Mobile Client Devices
By Aaron Turner, IANS Faculty

 Best Practices in Drone Security

Drones offer a cost-effective way to perform tasks like remote monitoring and equipment inspections, but how secure are they? In this Ask-an-Expert live interaction, IANS Faculty Aaron Turner provides an overview of the market and offers tips for ensuring drones don't adversely impact your security posture.

Read More »

November 20, 2017 | Security Awareness, Phishing, Social Engineering
By Dave Shackleford, IANS Faculty

 Defend Your Internal Phishing Campaign to Upper Management

Security teams know internal phishing programs are important, but how can they prove that to others in the organization? In this Ask-an-Expert written response, IANS Faculty Dave Shackleford explains how internal phishing campaigns help validate other security controls and offers multiple stats to prove their benefits, including the fact that simulated phishing attacks yield an average ROI of 37 percent.

Read More »

November 16, 2017 | Security Information and Event Management (SIEM) and Log Management

 SIEM Use-Case Checklist

It can be easy to underestimate the time and effort required to effectively operate and manage a SIEM. This detailed, sortable checklist is designed to help organizations determine where they stand on a number of specific SIEM use-case scenarios. 

Read More »

November 15, 2017 | Authentication
By Aaron Turner, IANS Faculty

 Correlate Real-World Users to Digital Identities

From ERP systems to Active Directory, digital identities are spread throughout our digital infrastructures. Unfortunately, most large organizations have no good way of correlating those digital identities to actual humans, a situation that both opens security holes and makes moving to new technologies like cloud and mobile much more difficult than it needs to be. In this report, IANS Faculty Aaron Turner shows how three key identity management building blocks can be used to effectively correlate real-world users to digital identities and improve enterprise security.

Read More »

November 14, 2017 | Recruiting, Hiring and Retention
By David Kolb, IANS Faculty

 Handling Chaos: Thriving When Policy and Business Priorities Clash

Information security professionals must be able to thrive in a turbulent environment where corporate policy, goals and priorities don’t always align across departments. In this webinar, IANS Faculty David Kolb discusses how to put multiple conflicting forces in perspective and better manage diverse demands by putting big ideas such as emotional intelligence, political intelligence and organizational intelligence into practice.

Read More »

November 14, 2017 | Authentication
By James Tarala, IANS Faculty

 Prep Now for an MFA/PAM Future

Deploying multi-factor authentication and privileged access management to manage server admin access, elevated privileges and remote access is a good first step, but organizations should be planning now for a completely password-less future. In this Ask-an-Expert live interaction, IANS Faculty James Tarala offers a brief history of MFA and PAM, as well as tips for eventually implementing strong authentication for everyone.

Read More »

November 13, 2017 | Enterprise and IT Compliance Management

 HIPAA Risk Assessment Template

The Health Insurance Portability and Accountability Act (HIPAA) Risk Assessment Template is designed to help organizations remain compliant with HIPAA. It describes a thorough risk analysis process organizations can take and identifies which supporting documents should be included as appendices.

Read More »