We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:



Recent Blogs & Podcasts

Insights Portal

\ Management & Leadership 

July 30, 2018 | Team Structure and Management
By Mike Saurbaugh, IANS Faculty

 Help the Business Understand Security‚Äôs Roles and Responsibilities

The business can't fully support information security unless it first understands its function and mission within the organization. In this Ask-an-Expert written response, IANS Faculty Mike Saurbaugh explains the difference between cyber and infosecurity, details typical infosec responsibilities and offers tips for gaining security buy-in from the business.

Read More »

July 25, 2018 | Vendor and Partner Management
By Dave Shackleford, IANS Faculty

 Optimize Your Vendor Toolset

Security teams typically find they accumulate too many security tools, many of which may overlap in scope or provide less value over time. In this report, IANS Faculty Dave Shackleford explains how to put the right processes in place to ensure you continually re-evaluate your critical toolsets and more fully optimize your operations. 

Read More »

July 9, 2018 | Security Policies and Strategy
By Kevin Beaver, IANS Faculty

 Tips for Security Policy/Standard Success

No security policy should be established without first performing a comprehensive risk assessment and ensuring everything ties back to business goals. In this Ask-an-Expert written response, IANS Faculty Kevin Beaver offers a step-by-step guide for putting successful security policies/standards in place.

Read More »

June 25, 2018 | Security Policies and Strategy
By Jake Williams, IANS Faculty

 Create an Acceptable Use Policy for a Culture of Trust

Security needs to walk a fine line when creating acceptable use policies that both outline consequences and foster a culture of trust. In this Ask-an-Expert written response, IANS Faculty Jake Williams provides a policy roadmap, and stresses the importance of being clear about what is and isn't being monitored, and why.

Read More »

June 19, 2018 | Encryption, Digital Signatures, Certificates, Tokenization
By Aaron Turner, IANS Faculty

 Three Success Factors for SSH Key Management

Despite the fact that most enterprises use hundreds of thousands of SSH keys on a regular basis, few have the right pieces in place to manage them effectively. In this Ask-an-Expert written response, IANS Faculty Aaron Turner says successful SSH key management depends on three factors: strong configuration management, mature service management and effective policy management.

Read More »

June 6, 2018 | Budgeting

 Security Spend Guideline

This table shows what most organizations consider a security spend vs. spending for other departments (IT, operations, network, etc.). While there are no hard-and-fast rules, this table provides a general, time-tested guideline.

Read More »

May 24, 2018 | Security Policies and Strategy
By Aaron Turner, IANS Faculty

 OTT Messaging Apps: Know the Risks

Over-the-top (OTT) messaging apps like WhatsApp and WeChat claim to offer top-notch privacy and security, but are they enterprise-ready? In this Ask-an-Expert written response, IANS Faculty Aaron Turner says that while such apps are actually more secure than email, they do have their downsides. He offers his recommendations, along with caveats around device, compliance and data retention.

Read More »