Filter By:



Recent Blogs & Podcasts

Insights Portal

\ Infrastructure 

February 13, 2018 | Security Analytics and Visualization
By John Strand, IANS Faculty,
     Aaron Turner, IANS Faculty

 Cut Through the AI/ML Hype

Vendors across the board are touting artificial intelligence and machine learning as the next big thing in security, but how practical is it for today's enterprises? In this Ask-an-Expert live interaction, IANS Faculty John Strand and Aaron Turner discuss the current state of the technology and offer practical ways to assess vendor offerings.

Read More »

January 12, 2018 | Vulnerability Assessment and Management
By Dave Kennedy, IANS Faculty

 Meltdown and Spectre: What to Do Now

The recently revealed Meltdown and Spectre chip vulnerabilities are leaving many security organizations scrambling to get a fix in place. In this Ask-an-Expert live interaction, IANS Faculty Dave Kennedy explains how attackers can leverage the flaws and why certain devices are more vulnerable than others. He also recommends taking a risk-based approach to patching them.

Read More »

January 10, 2018 | Malware and Advanced Threats
By Aaron Turner, IANS Faculty

 Information Security Trends for 2018

In 2017, we saw some of our most valued controls undermined and witnessed security incidents impacting businesses around the world.  What will 2018 bring? In this report and webinar, IANS Faculty Aaron Turner examines the major trends in store for IT security professionals in the coming year. From the new incidents we need to prepare for to the investments we need to make to keep up with attackers' capabilities, we have our work cut out for us..

Read More »

November 28, 2017 | Mobile Access and Device Management
By Aaron Turner, IANS Faculty

 Balance Remote Worker Security and Privacy

Managing remote workers can be difficult, especially when looking to balance security with worker privacy. In this Ask-an-Expert written response, IANS Faculty Aaron Turner recommends relying on a combination of configuration and endpoint management along with strict guidelines for employee consent.

Read More »

November 21, 2017 | Mobile Client Devices
By Aaron Turner, IANS Faculty

 Best Practices in Drone Security

Drones offer a cost-effective way to perform tasks like remote monitoring and equipment inspections, but how secure are they? In this Ask-an-Expert live interaction, IANS Faculty Aaron Turner provides an overview of the market and offers tips for ensuring drones don't adversely impact your security posture.

Read More »

October 16, 2017 | Endpoints

 Endpoint Protection Vendor Checklist

Current endpoint security products have a much more complicated job to do than antivirus ever did, and there’s no shortage of technologies on the market today to choose from. Regardless of the vendor, when considering an endpoint protection product, use this feature checklist to make sure you’re covering all your bases.

Read More »

October 16, 2017 | Endpoints

 Infosec Quick-Wins Checklist

There's nothing more frustrating than investing in the latest security technologies and "solutions" only to find that a few simple process changes would have accomplished the same things at far less cost. This checklist offers a number of low-cost, high-impact tips for improving your organization's security posture.

Read More »

September 18, 2017 | Embedded Systems and Internet of Things
By Chris Poulin, IANS Faculty

 Poulin: The Economics of IoT Fear and Uncertainty

Information- (and now device-) security is an underappreciated field. It’s anti-climactic and difficult to justify the cost of building security in, bolting security on and implementing security controls for the operating environment. But it's up to us in the community to become early adopters and work with the manufacturers to make products as secure as possible for the general public. 

Read More »

August 14, 2017 | Embedded Systems and Internet of Things
By Aaron Turner, IANS Faculty

 The Internet of Criminal Things: How Technology Commoditization Has Driven Our Current IoT Nightmares

Just like all technologists, criminals have taken advantage of the low costs of high-performance components such as Bluetooth and cellular modems. In this webinar, IANS Faculty Aaron Turner discusses how enterprises can use a diverse set of technologies to monitor for the presence of “Criminal Things” and what kinds of controls are available to help solve the problem in the long term.

Read More »