Filter By:



Recent Blogs & Podcasts

Insights Portal

\ Enterprise Software 

February 7, 2018 | Business Productivity
By Aaron Turner, IANS Faculty

 Choose a Secure Executive Portal

Executive portals and board books must be both easy enough for top execs to use and secure enough to keep board-level information safe. In this Ask-an-Expert written response, IANS Faulty Aaron Turner considers the pros and cons of three offerings: Boardvantage, Diligent and BoardPad.

Read More »

January 25, 2018 | Patch Management
By Josh More, IANS Faculty

 Streamline Patching for Third-Party Apps

Patching Windows systems is difficult enough without adding third-party tools like Java, Adobe and others to the mix. In this Ask-an-Expert written response, IANS Faculty Josh More explains how achieving patch management maturity requires a combination of imaging, deployment, patching and vulnerability scanning technologies, plus a large degree of automation.

Read More »

January 12, 2018 | Vulnerability Assessment and Management
By Dave Kennedy, IANS Faculty

 Meltdown and Spectre: What to Do Now

The recently revealed Meltdown and Spectre chip vulnerabilities are leaving many security organizations scrambling to get a fix in place. In this Ask-an-Expert live interaction, IANS Faculty Dave Kennedy explains how attackers can leverage the flaws and why certain devices are more vulnerable than others. He also recommends taking a risk-based approach to patching them.

Read More »

January 11, 2018 | Cloud Application and Data Controls
By George Gerchow, IANS Faculty

 Architect and Secure Your Office 365 Migration

Moving from a traditional Windows environment to Office 365 in the cloud requires quite a bit of planning and forethought. In this Ask-an-Expert written response, IANS Faculty George Gerchow recommends leveraging the security extras in Microsoft's E5 licenses, as well as using third-party authentication and a CASB tool to ensure the migration is fast and secure.

Read More »

October 6, 2017 | Malware and Advanced Threats
By Mike Saurbaugh, IANS Faculty

 IANS Vulnerability and Breach Update: Q3 2017

Vulnerabilities and breaches are mainstream news regularly. With a new vulnerability seemingly discovered daily, which should be taken more seriously (i.e., patch now!) and which are overhyped? In this quarterly research report, IANS Faculty Mike Saurbaugh updates clients on the top vulnerabilities and breaches from the past quarter and provides some real-world context and perspective.

Read More »

September 29, 2017 | Vulnerability Assessment and Management
By Dave Shackleford, IANS Faculty

 Toning Up the Vulnerability Management Core

When it comes to safeguarding your organization, it's the security basics, not the shiny new widgets, that get the job done. In this report, IANS Lead Faculty Dave Shackleford details the fundamental technology controls required to tone up your vulnerability management core, including inventory management/maintenance, patch management and implementing rigorous configuration controls that meet or exceed industry best practices. 

Read More »

August 18, 2017 | Vulnerability Assessment and Management
By Josh More, IANS Faculty

 Take an Effort-Based Approach to Vulnerability Management

Traditional risk-only based approaches to vulnerability management often lead to conflicts between security and the business, each of which has difficulty understanding the priorities and motivations of the other. In this Ask-an-Expert written response, IANS Faculty Josh More explains how an effort-based approach can side-step such issues, improving security while fostering better relations with the business.

Read More »

August 17, 2017 | Vulnerability Assessment and Management
By Kevin Beaver, IANS Faculty

 Expand Vulnerability Scanning and Assessments in a Highly Regulated, Tightly Staffed Environment

Vulnerability management within a large, highly regulated environment is time-consuming and complicated. In this live Ask-an-Expert written interaction, IANS Faculty Kevin Beaver suggests leveraging a current MSSP relationship to improve visibility, expand capabilities and get a jump start on better managing the process.

Read More »