We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

Insights Portal

\ Infrastructure 



April 25, 2018 | Embedded Systems and Internet of Things
By Chris Poulin, IANS Faculty

 Balancing Risk and Reward in IoT Security

Enterprises are scrambling to leverage IoT to gain market share and grow revenues, but can they address IoT's risks at the same speed and scale? In this report, IANS Faculty Chris Poulin discusses how to leverage a mix of existing and emerging infrastructure controls to build both a short- and long-term enterprise security strategy for IoT.

Read More »


April 24, 2018 | Security Policies and Strategy
By Aaron Turner, IANS Faculty

 Set Optimal Policies for Securing NLP Devices

Consumer digital assistants (CDAs) that use natural language processing (NLP) are proliferating, but are Alexa and Siri safe for the enterprise? In this Ask-an-Expert written response, IANS Faculty Aaron Turner details why CDAs are not enterprise-ready and should not be allowed on corporate networks, but he does offer some rules of thumb for creating enterprise-ready NLP solutions. 

Read More »


April 23, 2018 | Endpoints
By Bill Dean, IANS Faculty

 Endpoint Detection and Response (EDR): A Market Overview

With more than 60 options to choose from, determining the best EDR solution for your environment can become overwhelming fast. In this Ask-an-Expert written response, IANS Faculty Bill Dean details the decision factors and suggests considering offerings in both the "security trinity" and standalone categories. 

Read More »


February 13, 2018 | Security Analytics and Visualization
By John Strand, IANS Faculty,
     Aaron Turner, IANS Faculty

 Cut Through the AI/ML Hype

Vendors across the board are touting artificial intelligence and machine learning as the next big thing in security, but how practical is it for today's enterprises? In this Ask-an-Expert live interaction, IANS Faculty John Strand and Aaron Turner discuss the current state of the technology and offer practical ways to assess vendor offerings.

Read More »


January 12, 2018 | Vulnerability Assessment and Management
By Dave Kennedy, IANS Faculty

 Meltdown and Spectre: What to Do Now

The recently revealed Meltdown and Spectre chip vulnerabilities are leaving many security organizations scrambling to get a fix in place. In this Ask-an-Expert live interaction, IANS Faculty Dave Kennedy explains how attackers can leverage the flaws and why certain devices are more vulnerable than others. He also recommends taking a risk-based approach to patching them.

Read More »


January 10, 2018 | Malware and Advanced Threats
By Aaron Turner, IANS Faculty

 Information Security Trends for 2018

In 2017, we saw some of our most valued controls undermined and witnessed security incidents impacting businesses around the world.  What will 2018 bring? In this report and webinar, IANS Faculty Aaron Turner examines the major trends in store for IT security professionals in the coming year. From the new incidents we need to prepare for to the investments we need to make to keep up with attackers' capabilities, we have our work cut out for us..

Read More »


November 28, 2017 | Mobile Access and Device Management
By Aaron Turner, IANS Faculty

 Balance Remote Worker Security and Privacy

Managing remote workers can be difficult, especially when looking to balance security with worker privacy. In this Ask-an-Expert written response, IANS Faculty Aaron Turner recommends relying on a combination of configuration and endpoint management along with strict guidelines for employee consent.

Read More »


November 21, 2017 | Mobile Client Devices
By Aaron Turner, IANS Faculty

 Best Practices in Drone Security

Drones offer a cost-effective way to perform tasks like remote monitoring and equipment inspections, but how secure are they? In this Ask-an-Expert live interaction, IANS Faculty Aaron Turner provides an overview of the market and offers tips for ensuring drones don't adversely impact your security posture.

Read More »


October 16, 2017 | Endpoints

 Endpoint Protection Vendor Checklist

Current endpoint security products have a much more complicated job to do than antivirus ever did, and there’s no shortage of technologies on the market today to choose from. Regardless of the vendor, when considering an endpoint protection product, use this feature checklist to make sure you’re covering all your bases.

Read More »