We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

Insights Portal

\ Data Protection 



August 2, 2018 | Data Classification

 RFP Template for Data Tagging

This document provides an easy-to-customize template for a request for proposal (RFP) that can be used to evaluate data tagging and classification vendors.

Read More »


July 17, 2018 | Encryption, Digital Signatures, Certificates, Tokenization
By Josh More, IANS Faculty

 Blockchain and Digital Currencies: Why They Matter Now

Blockchain and digital currencies are hot topics in the news and the board room, but security teams are just now putting them on their radar. In this report, IANS Faculty Josh More details how the technologies work, how the system is being exploited and what organizations can do to protect themselves.

Read More »


July 17, 2018 | Authentication
By Michael Pinch, IANS Faculty

 Blockchain as an Infosec Strength and Weakness

As crypto currency trading grows more popular, people are hearing a lot about how the Blockchain is key to making it all work. Meanwhile, security experts are talking more about the technology as a defensive asset and, if abused, a dangerous threat vector. In this webinar, IANS Faculty Michael Pinch walks through how Blockchain came about, how it works and how it’s central to managing digital currency transactions. He also reviews how it can be used to bolster security, how the bad guys can exploit it to launch attacks, and what organizations can do to protect themselves.

Read More »


June 19, 2018 | Encryption, Digital Signatures, Certificates, Tokenization
By Aaron Turner, IANS Faculty

 Three Success Factors for SSH Key Management

Despite the fact that most enterprises use hundreds of thousands of SSH keys on a regular basis, few have the right pieces in place to manage them effectively. In this Ask-an-Expert written response, IANS Faculty Aaron Turner says successful SSH key management depends on three factors: strong configuration management, mature service management and effective policy management.

Read More »


May 31, 2018 | Encryption, Digital Signatures, Certificates, Tokenization
By Aaron Turner, IANS Faculty

 Consider Three Cloud-Ready Encryption Options

As organizations make the move to the cloud, many are realizing it's time to re-think their current encryption toolset. In this Ask-an-Expert written response, IANS Faculty Aaron Turner suggests three cloud-ready options: AWS KMS, Azure Key Vault and Gemalto.

Read More »


May 24, 2018 | Security Policies and Strategy
By Aaron Turner, IANS Faculty

 OTT Messaging Apps: Know the Risks

Over-the-top (OTT) messaging apps like WhatsApp and WeChat claim to offer top-notch privacy and security, but are they enterprise-ready? In this Ask-an-Expert written response, IANS Faculty Aaron Turner says that while such apps are actually more secure than email, they do have their downsides. He offers his recommendations, along with caveats around device, compliance and data retention.

Read More »