We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:



Recent Blogs & Podcasts

Content Aggregator

\ Content Aggregator\ Key Technologies


Vetted, curated, third party sourced information security content in downloadable PowerPoint format to support internal communications to the C-suite, Board, and lines of business.

IANS Content Aggregator

[ 386 ]


Single Content Aggregator slides, organized by six topical categories.

View All Slides
[ 5 ]


Collections of single Content Aggregator slides on specific InfoSec topics.

View Compilations
[ 2 ]


Compilations of slides that include a viewpoint or “IANS Perspective”.

View Narratives

December 10, 2018 | Key Technologies

 Blockchain: Overview of Adoption Concerns

Criminal activity associated with blockchain is the top concerns organizations have with adopting the technology in their organizations. Transaction privacy leakage and private key security rank among the top concerns as well.

Read More »

November 5, 2018 | Key Technologies

 Artificial Intelligence: How It Supports Cybersecurity

Approximately 65 percent of IT and security professionals say artificial intelligence (AI) will support technologies that identify and authenticate users. Another 54 percent say AI provides security intelligence, and 39 percent say it helps simplify the prioritization of threats.

Read More »

November 1, 2018 | Key Technologies

 Artificial Intelligence: Top Governance Challenges to Deployment

Staffing and internal expertise are the most significant governance challenges to AI deployment. Half of respondents say it requires too much staff to implement and maintain AI-based technologies, and 45 percent of respondents say the lack of internal expertise to validate vendors’ claims are governance challenges.

Read More »

October 17, 2018 | Key Technologies

 Overview of the Use of Multi-Factor Authentication

Organizations use passwords only instead of multi-factor authentication on homegrown or on-premises apps (75%), Mac machines (72%) and privileged account management products (57%). Multifactor authentication is used over passwords only by more organizations on Windows machines (55%), SaaS apps (51%) and for access to virtual private networks (50%).

Read More »

September 24, 2018 | Key Technologies

 IoT Security

Securing the Internet of Things is no easy task, and organizations are spending more time and money on trying to do just that. 

Read More »