We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:



Recent Blogs & Podcasts

Insights Portal

\ Infrastructure 

August 16, 2018 | Embedded Systems and Internet of Things
By Aaron Turner, IANS Faculty

 Gauge Threats Against City Surveillance Systems

The internet of things (IoT) is often targeted by malicious actors, but what type of threats are most common for city surveillance systems such as red light/speed cameras? In this Ask-an-Expert written response, IANS Faculty Aaron Turner says to watch out for cryptocurrency opportunists, among others.

Read More »

April 25, 2018 | Embedded Systems and Internet of Things
By Chris Poulin, IANS Faculty

 Balancing Risk and Reward in IoT Security

Enterprises are scrambling to leverage IoT to gain market share and grow revenues, but can they address IoT's risks at the same speed and scale? In this report, IANS Faculty Chris Poulin discusses how to leverage a mix of existing and emerging infrastructure controls to build both a short- and long-term enterprise security strategy for IoT.

Read More »

April 24, 2018 | Security Policies and Strategy
By Aaron Turner, IANS Faculty

 Set Optimal Policies for Securing NLP Devices

Consumer digital assistants (CDAs) that use natural language processing (NLP) are proliferating, but are Alexa and Siri safe for the enterprise? In this Ask-an-Expert written response, IANS Faculty Aaron Turner details why CDAs are not enterprise-ready and should not be allowed on corporate networks, but he does offer some rules of thumb for creating enterprise-ready NLP solutions. 

Read More »

April 23, 2018 | Endpoints
By Bill Dean, IANS Faculty

 Endpoint Detection and Response (EDR): A Market Overview

With more than 60 options to choose from, determining the best EDR solution for your environment can become overwhelming fast. In this Ask-an-Expert written response, IANS Faculty Bill Dean details the decision factors and suggests considering offerings in both the "security trinity" and standalone categories. 

Read More »

February 13, 2018 | Security Analytics and Visualization
By John Strand, IANS Faculty,
     Aaron Turner, IANS Faculty

 Cut Through the AI/ML Hype

Vendors across the board are touting artificial intelligence and machine learning as the next big thing in security, but how practical is it for today's enterprises? In this Ask-an-Expert live interaction, IANS Faculty John Strand and Aaron Turner discuss the current state of the technology and offer practical ways to assess vendor offerings.

Read More »

January 12, 2018 | Vulnerability Assessment and Management
By Dave Kennedy, IANS Faculty

 Meltdown and Spectre: What to Do Now

The recently revealed Meltdown and Spectre chip vulnerabilities are leaving many security organizations scrambling to get a fix in place. In this Ask-an-Expert live interaction, IANS Faculty Dave Kennedy explains how attackers can leverage the flaws and why certain devices are more vulnerable than others. He also recommends taking a risk-based approach to patching them.

Read More »

January 10, 2018 | Malware and Advanced Threats
By Aaron Turner, IANS Faculty

 Information Security Trends for 2018

In 2017, we saw some of our most valued controls undermined and witnessed security incidents impacting businesses around the world.  What will 2018 bring? In this report and webinar, IANS Faculty Aaron Turner examines the major trends in store for IT security professionals in the coming year. From the new incidents we need to prepare for to the investments we need to make to keep up with attackers' capabilities, we have our work cut out for us..

Read More »

November 28, 2017 | Mobile Access and Device Management
By Aaron Turner, IANS Faculty

 Balance Remote Worker Security and Privacy

Managing remote workers can be difficult, especially when looking to balance security with worker privacy. In this Ask-an-Expert written response, IANS Faculty Aaron Turner recommends relying on a combination of configuration and endpoint management along with strict guidelines for employee consent.

Read More »