Filter By:

Recent Blogs & Podcasts


\ Cloud Computing 

July 13, 2017 | Cloud Access Security Brokers
By George Gerchow, IANS Faculty

 Tips for Choosing, Deploying a CASB

Finding the right CASB for a global organization with critical use cases around shadow IT, DLP, encryption and more can be challenging. In this Ask-an-Expert live interaction, IANS Faculty George Gerchow helps weigh the options and offers tips for avoiding common deployment, staffing and vendor management issues.

Read More »

July 7, 2017 | Cloud Network and Host Controls
By Dave Shackleford, IANS Faculty

 IANS Cloud Security Update: Q2 2017

As organizations continue to move services and computing assets into cloud service provider environments, the need for adequate security controls grows as well. In this quarterly research report, IANS Faculty Dave Shackleford updates IANS’ clients on the new developments occurring in the cloud security arena.

Read More »

June 19, 2017 | Privacy
By Rebecca Herold, IANS Faculty

 Building a Framework for Data Privacy and Protection in the Cloud

With more and more security incidents originating in the cloud, new data privacy and protection regulations are emerging. Cloud services must establish and maintain effective privacy and compliance programs, while organizations that leverage cloud services need to establish sound frameworks for mitigating risks in their own right. In this webinar, IANS Faculty Rebecca Herold reviews the most common risks cloud services must address and details specific steps organizations can take to prevent breaches and the corresponding penalties.   

Read More »

June 1, 2017 | Encryption, Digital Signatures, Certificates, Tokenization
By David Etue, IANS Faculty

 Key Management: Evolving Best Practices

Encryption is critical, but what is the best way to implement secure key management? In this written Ask-an-Expert response, IANS Faculty David Etue outlines the most common roles and approaches, along with unique risks presented by emerging technologies like cloud access security brokers (CASBs).

Read More »

May 24, 2017 | Security Policies and Strategy
By George Gerchow, IANS Faculty

 Get Your Security Spending Priorities in Order

Budgeting for new security initiatives requires prioritizing technologies that help improve security today -- and tomorrow. In this Ask-an-Expert written response, IANS Faculty George Gerchow offers his take on the importance of cloud access security brokers, privileged access management and other tools for companies moving to the cloud.

Read More »

May 18, 2017 | Cloud Application and Data Controls
By Dave Shackleford, IANS Faculty

 Security-as-Code: A Key to Cloud Security

Businesses are moving faster to the cloud and DevOps is accelerating scale and pushing automation. But how do we secure DevOps and cloud deployments? In this report, IANS Faculty Dave Shackleford explores the concept of security-as-code and details how security teams must fully assess their threats, collaborate with DevOps and automate scanning and configuration to ensure a secure migration to the cloud. 

Read More »

May 11, 2017 | Cloud Application and Data Controls
By Aaron Turner, IANS Faculty

 Securing Cloud Assets Using Federated Identities

Whether you view the cloud as infrastructure-, platform- or application-as-a-service, identity is the only control that exists universally across all cloud environments. Unfortunately, identity lifecycle management for cloud-based systems is not as mature as we need it to be. In this report, IANS Faculty Aaron Turner details how to make wise investments in a federated identity strategy that can scale to even the most complex cloud technology models.

Read More »