We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

Insights Portal

\ Enterprise Software

 


October 5, 2018 | Malware and Advanced Threats
By Mike Saurbaugh, IANS Faculty

 IANS Vulnerability and Breach Update: Q3 2018

Vulnerabilities and breaches are mainstream news regularly. With a new vulnerability seemingly discovered daily, which should be taken more seriously (i.e., patch now!) and which are overhyped? In this quarterly research report, IANS Faculty Mike Saurbaugh updates clients on the top vulnerabilities and breaches from the past quarter and provides some real-world context and perspective.

Read More »


September 21, 2018 | Cloud Application and Data Controls

 Office 365 Checklist

This checklist is designed to help organizations roll out Office 365 efficiently and securely.

Read More »


September 13, 2018 | Networking and Network Devices
By Dave Shackleford, IANS Faculty

 Six Secure Email Gateways Compared

Secure email gateways come in a variety of form factors and vary in terms of features, ease of integration, scalability and more. In this Ask-an-Expert written response, IANS Faculty Dave Shackleford details the pros and cons of offerings from six vendors: Barracuda Networks, Cisco, Forcepoint, Microsoft, Symantec and Trend Micro.

Read More »


July 10, 2018 | Business Productivity
By Michael Pinch, IANS Faculty

 Tag External Email Efficiently and Effectively

Many organizations are considering tagging external email as way to raise awareness for internal users, but what is the best way to go about it? In this live Ask-an-Expert interaction, IANS Faculty Michael Pinch recommends some best practices but also suggests using tools like SPF, DKIM and DMARC for added security. 

Read More »


July 2, 2018 | Patch Management
By Aaron Turner, IANS Faculty

 Apply Patching Best Practices to Network Devices

Many organizations have mature patching programs for Windows, Linux and Unix servers, but few apply the same rigor to network devices like routers, switches and load balancers. In this Ask-an-Expert written response, IANS Faculty Aaron Turner explains why that is and offers some tips for ensuring network devices are patched efficiently.

Read More »


June 21, 2018 | Vulnerability Assessment and Management
By Kevin Beaver, IANS Faculty

 Best Practices in Database Vulnerability Management

Beyond data encryption and access monitoring, how can organizations ensure the data within their SQL Server, DB2 and Oracle databases are secure? In this Ask-an-Expert written response, IANS Faculty Kevin Beaver recommends performing authenticated vulnerability scans in addition to implementing in-depth penetration testing, monitoring and other controls.

Read More »


May 16, 2018 | Networking and Network Devices
By Dave Shackleford, IANS Faculty

 Five Secure Email Gateways Compared

Secure email gateways come in a variety of form factors and vary in terms of features, ease of integration, scalability and more. In this Ask-an-Expert written response, IANS Faculty Dave Shackleford details the pros and cons of offerings from five vendors: Barracuda Networks, Cisco, Microsoft, Symantec and Trend Micro.

Read More »


May 14, 2018 | Vendor and Partner Management
By Josh More, IANS Faculty

 Protect Vendor/Supplier Transactions and Payments

With all the incidents of business email compromise and payment system abuse in the news, many organizations are looking to better secure their vendor/supplier payment processes. In this live Ask-an-Expert interaction, IANS Faculty Josh More details two-factor authentication, out-of-band verification and other strategies to help fortify systems against such attacks.

Read More »