Filter By:

Type

Topic

Recent Blogs & Podcasts

Insights Portal

\ Networking 



April 9, 2018 | Intrusion Prevention/Detection (IPS/IDS)
By Jake Williams, IANS Faculty

 Choose the Best IDS/IPS for a New Wide-Area Network

An IDS/IPS is a critical WAN security control, but choosing the right one for your environment requires some research. In this Ask-an-Expert written response, IANS Faculty Jake Williams details the key criteria to consider and suggests evaluating solutions from four main vendors: Check Point, Cisco, McAfee and WatchGuard.

Read More »


February 1, 2018 | Firewalls, NGFW
By Aaron Turner, IANS Faculty

 Address SSL Inspection Privacy and Performance Concerns

Most organizations agree that inspecting SSL traffic is critical to detecting and preventing all kinds of malware, but many let privacy and performance concerns hold them back from implementing the feature. In this Ask-an-Expert written response, IANS Faculty Aaron Turner offers practical steps for implementing SSL inspection without adversely impacting user privacy or application performance.

Read More »


December 21, 2017 | Encryption, Digital Signatures, Certificates, Tokenization
By Aaron Turner, IANS Faculty

 Manage SSH and RDP Securely

SSH and RDP are widely leveraged across most enterprises, but what are the best practices for securing them? In this Ask-an-Expert written response, IANS Faculty Aaron Turner underscores the importance of segmentation/filtering, jump servers and multifactor authentication in ensuring both protocols are implemented and managed securely.

Read More »


October 30, 2017 | Architecture, Configuration and Segmentation

 Internal Network Monitoring Solution Request-for-Proposal (RFP) Template

When creating a request for proposal (RFP) of any kind, the purpose is to ensure prospective vendors can check all of the necessary boxes. This document provides a comprehensive RFP template specifically designed for organizations seeking an internal network monitoring solution.

Read More »


October 16, 2017 | Wireless Networks

 KRACK Weakness in WPA2 Wi-Fi Security Protocol

On October 16, 2017, researchers disclosed a major weakness in the Wi-Fi Protected Access 1 (WPA1) and WPA2 security protocols. WPA2 is the most widely used Wi-Fi security standard in the world. The disclosure was a proof-of-concept, and there are currently no confirmed reports of this vulnerability, known as KRACK (an acronym for Key Reinstallation Attacks), being actively exploited in the wild.

Read More »


October 16, 2017 | Endpoints

 Infosec Quick-Wins Checklist

There's nothing more frustrating than investing in the latest security technologies and "solutions" only to find that a few simple process changes would have accomplished the same things at far less cost. This checklist offers a number of low-cost, high-impact tips for improving your organization's security posture.

Read More »


August 23, 2017 | Architecture, Configuration and Segmentation
By Dave Kennedy, IANS Faculty

 Why Jump Servers Are Important

Developers and system administrators may not like using jump servers to access critical resources, but they are an important layer of security, especially when it comes to disrupting lateral movement. In this Ask-an-Expert written response, IANS Faculty Dave Kennedy explains how using - and configuring - jump servers correctly can slow down attackers and help prevent data loss.

Read More »