Filter By:

Type

Topic

Recent Blogs & Podcasts

Insights Portal

\ Data Protection 



February 14, 2018 | Authentication
By Andrew Carroll, IANS Faculty

 Understanding Blockchain‚Äôs Promise for Identity Management

While blockchains were developed to solve problems very different from identity management, some vendors (and enterprises) are beginning to explore how blockchains could be used to both secure and provide more granular control over digital identities. In this report, IANS Faculty Andrew Carroll explains the pros and cons of using blockchains for identity, and provides a practical overview of the vendors addressing the space.  

Read More »


February 13, 2018 | Security Analytics and Visualization
By John Strand, IANS Faculty,
     Aaron Turner, IANS Faculty

 Cut Through the AI/ML Hype

Vendors across the board are touting artificial intelligence and machine learning as the next big thing in security, but how practical is it for today's enterprises? In this Ask-an-Expert live interaction, IANS Faculty John Strand and Aaron Turner discuss the current state of the technology and offer practical ways to assess vendor offerings.

Read More »


February 8, 2018 | Encryption, Digital Signatures, Certificates, Tokenization
By Dave Shackleford, IANS Faculty

 Best Practices in Secrets Management

Keeping secrets like passwords, private SSH keys, certificates and API tokens safe requires more than just a secure data store. In this Ask-an-Expert written response, IANS Faculty Dave Shackleford steps you through the tools and processes for ensuring all your secrets stay secret.

Read More »


February 1, 2018 | Firewalls, NGFW
By Aaron Turner, IANS Faculty

 Address SSL Inspection Privacy and Performance Concerns

Most organizations agree that inspecting SSL traffic is critical to detecting and preventing all kinds of malware, but many let privacy and performance concerns hold them back from implementing the feature. In this Ask-an-Expert written response, IANS Faculty Aaron Turner offers practical steps for implementing SSL inspection without adversely impacting user privacy or application performance.

Read More »


January 30, 2018 | Encryption, Digital Signatures, Certificates, Tokenization
By Steve Coplan, IANS Faculty

 Cloud Key Management Services: An Overview

Moving to the cloud is fraught with critical decisions, not the least of which is key management. in this Ask-an-Expert written response, IANS Faculty Steve Coplan explains the challenges in implementing strong cloud key management and provides an overview of cloud service provider and partner offerings, as well as newer as-a-service options.

Read More »


January 15, 2018 | Encryption, Digital Signatures, Certificates, Tokenization
By Aaron Turner, IANS Faculty

 Best Practices in Data Protection

When it comes to data protection, many organizations focus on encryption first, but is that the best strategy? In this Ask-an-Expert live interaction, IANS Faculty Aaron Turner emphasizes the importance of first building a strong foundation of configuration and identity management, before moving on to strong key management and other data security controls.

Read More »


January 10, 2018 | Malware and Advanced Threats
By Aaron Turner, IANS Faculty

 Information Security Trends for 2018

In 2017, we saw some of our most valued controls undermined and witnessed security incidents impacting businesses around the world.  What will 2018 bring? In this report and webinar, IANS Faculty Aaron Turner examines the major trends in store for IT security professionals in the coming year. From the new incidents we need to prepare for to the investments we need to make to keep up with attackers' capabilities, we have our work cut out for us..

Read More »


December 21, 2017 | Encryption, Digital Signatures, Certificates, Tokenization
By Aaron Turner, IANS Faculty

 Manage SSH and RDP Securely

SSH and RDP are widely leveraged across most enterprises, but what are the best practices for securing them? In this Ask-an-Expert written response, IANS Faculty Aaron Turner underscores the importance of segmentation/filtering, jump servers and multifactor authentication in ensuring both protocols are implemented and managed securely.

Read More »


December 13, 2017 | IT Asset Disposal (ITAD)
By Chris Gonsalves, IANS Director of Technology Research

 Trash Talk: Addressing the Security Menace Lurking in Old IT Assets

Every IT department has a dirty little secret: closets filled with old, unused gear that pose significant risk to the organization. In this webinar, Chris Gonsalves looks at the perils and security implications of improperly disposing end-of-life IT assets and discusses responsible, appropriate methods of equipment wiping, destroying, recycling and repurposing with an eye toward reducing risk and ensuring data confidentiality and integrity.

Read More »