Filter By:

Recent Blogs & Podcasts


\ Identity & Access Management 

November 15, 2017 | Authentication
By Aaron Turner, IANS Faculty

 Correlate Real-World Users to Digital Identities

From ERP systems to Active Directory, digital identities are spread throughout our digital infrastructures. Unfortunately, most large organizations have no good way of correlating those digital identities to actual humans, a situation that both opens security holes and makes moving to new technologies like cloud and mobile much more difficult than it needs to be. In this report, IANS Faculty Aaron Turner shows how three key identity management building blocks can be used to effectively correlate real-world users to digital identities and improve enterprise security.

Read More »

November 14, 2017 | Authentication
By James Tarala, IANS Faculty

 Prep Now for an MFA/PAM Future

Deploying multi-factor authentication and privileged access management to manage server admin access, elevated privileges and remote access is a good first step, but organizations should be planning now for a completely password-less future. In this Ask-an-Expert live interaction, IANS Faculty James Tarala offers a brief history of MFA and PAM, as well as tips for eventually implementing strong authentication for everyone.

Read More »

October 16, 2017 | Risk Management

 Employee Termination Checklist

Former employees at many organizations still have access to corporate applications after they leave their jobs. Even the most basic security missteps can leave an organization vulnerable to unauthorized access or breaches long after an employee leaves a job. This checklist offers information security best practices and actions to take when an employee leaves an organization.

Read More »

September 26, 2017 | Authentication
By Michael Pinch, IANS Faculty

 Determine the Best MFA Fit: Duo vs. Azure

When it comes to deploying effective multifactor authentication (MFA) across a large user enterprise, success depends on matching the MFA solution to your operational strategy. In this Ask-an-Expert written response, IANS Faculty Michael Pinch provides a functional comparison of both Duo and Microsoft Azure MFA in terms of security, channels, ease of use and ease of enrollment.

Read More »

September 20, 2017 | Account Provisioning
By Aaron Turner, IANS Faculty

 Revoke Network Access Efficiently and Effectively

Depending on the human element and manual notifications to revoke network access when users leave the company is neither scalable nor dependable. In this Ask-an-Expert written response, IANS Faculty Aaron Turner suggests using some script-based workarounds to automate the process while evaluating the move to a newer, more automated IDAM platform for the future.

Read More »

September 14, 2017 | Encryption, Digital Signatures, Certificates, Tokenization
By Dave Shackleford, IANS Faculty

 Apply Blockchain Technology to Enterprise Security

Blockchain has been the focus of many hype cycles of late, and it seems to be making inroads into every technology area under the sun - but how enterprise-ready is it? In this report, IANS Lead Faculty Dave Shackleford examines how the technology works and details its current and future use cases in security.

Read More »

August 15, 2017 | Application Development and Testing
By Andrew Carroll, IANS Faculty

 Help Developers Understand the Importance of Least Privilege

Developers usually push to access any data they want anytime they want it, but unfettered access can open the whole organization up to unnecessary audit, financial and reputational risks. In this Ask-an-Expert written response, IANS Faculty Andrew Carroll suggests educating developers on the risks, implementing least privilege and layering on controls to ensure compliance.

Read More »

July 26, 2017 | Password Management
By Rich Guida, IANS Faculty

 Implement a Strong Corporate Password Policy

Creating a corporate password policy can be a very complex challenge, particularly considering the fact that passwords bring with them some significant enterprise risks. In this Ask-an-Expert written response, IANS Faculty Rich Guida details the standard guidelines for password policies and offers tips for taking them to the next level. 

Read More »