Filter By:

Recent Blogs & Podcasts


\ Data Protection 

November 13, 2017 | Enterprise and IT Compliance Management

 HIPAA Risk Assessment Template

The Health Insurance Portability and Accountability Act (HIPAA) Risk Assessment Template is designed to help organizations remain compliant with HIPAA. It describes a thorough risk analysis process organizations can take and identifies which supporting documents should be included as appendices.

Read More »

October 26, 2017 | Encryption, Digital Signatures, Certificates, Tokenization
By David Etue, IANS Faculty

 Help Users Understand the Importance of Encryption

Encryption is a powerful control with myriad use cases and business implications, but getting end users to understand its importance is no easy task. In this Ask-an-Expert written response, IANS Faculty David Etue explains why organizations use encryption, what can happen when it's not used and how much easier it is to apply encryption than to deal with the ramifications of a breach or data loss.

Read More »

October 22, 2017 | Data Breaches
By Ken Van Wyk, IANS Faculty

 Van Wyk: Take Steps to Protect Yourself as a Consumer

With all the digital threats we face on a daily basis, it's a miracle we haven't all been hacked. To ensure the odds are in your favor, there are some informed and well-planned steps you can take to protect yourself as a consumer, particularly as the holiday shopping season approaches. 

Read More »

October 11, 2017 | Encryption, Digital Signatures, Certificates, Tokenization
By Aaron Turner, IANS Faculty

 The Future of Enterprise Encryption: Prioritizing What Matters

Encryption is a hard technology to understand and an even harder one to deploy in a consistent, reliable way. In this report, IANS Faculty Aaron Turner explains how enterprises should be re-prioritizing their encryption technologies, staffing and investments to handle the increasingly larger role encryption is set to play in today's (and tomorrow's) information security programs.

Read More »

September 14, 2017 | Encryption, Digital Signatures, Certificates, Tokenization
By Dave Shackleford, IANS Faculty

 Apply Blockchain Technology to Enterprise Security

Blockchain has been the focus of many hype cycles of late, and it seems to be making inroads into every technology area under the sun - but how enterprise-ready is it? In this report, IANS Lead Faculty Dave Shackleford examines how the technology works and details its current and future use cases in security.

Read More »

September 8, 2017 | Data Classification
By Michael Pinch, IANS Faculty

 Data Classification: Design for the Human, Enforce with Technology

Data classification policies can be difficult for end users to interpret, leaving organizations open to data leakage issues and more. In this Ask-an-Expert live interaction, IANS Faculty Mike Pinch details the importance of creating human-friendly policies and ensuring employee awareness but also backstopping the process with layered technology solutions such as DLP and DRM. 

Read More »

September 7, 2017 | Data Classification
By Josh More, IANS Faculty

 Take a Phased Approach to Data Classification

End-to-end enterprise data classification/management programs are seldom successful out of the gate, but they can get there eventually. In this written Ask-an-Expert response, IANS Faculty Josh More explains the limitations of data management tool sets, and advocates for an iterative, phased approach that starts small and becomes increasingly successful over time.  

Read More »

September 1, 2017 | Data Loss Prevention (DLP)
By James Tarala, IANS Faculty

 Implement DLP Effectively

The best DLP implementations go beyond technology considerations to focus on achieving business goals. In this Ask-an-Expert written response, IANS Faculty James Tarala explains how to build an effective DLP program, from creating optimal governance and data classification policies to choosing the right keywords and vendors. 

Read More »