Filter By:

Type

Topic

Recent Blogs & Podcasts

Insights Portal

\ Security Operations 



February 13, 2018 | Security Analytics and Visualization
By John Strand, IANS Faculty,
     Aaron Turner, IANS Faculty

 Cut Through the AI/ML Hype

Vendors across the board are touting artificial intelligence and machine learning as the next big thing in security, but how practical is it for today's enterprises? In this Ask-an-Expert live interaction, IANS Faculty John Strand and Aaron Turner discuss the current state of the technology and offer practical ways to assess vendor offerings.

Read More »


February 6, 2018 | Security Information and Event Management (SIEM) and Log Management
By Justin Searle, IANS Faculty

 Strike the Right Balance When Logging Windows Events

Deciding what to log - and what not to log - is more of art than a science. In this Ask-an-Expert written response, IANS Faculty Justin Searle recommends starting with regulatory requirements and Microsoft's audit policy recommendations, as well as using the Suspect subscription to ensure  Windows event logs stay manageable and actionable.

Read More »


January 10, 2018 | Malware and Advanced Threats
By Aaron Turner, IANS Faculty

 Information Security Trends for 2018

In 2017, we saw some of our most valued controls undermined and witnessed security incidents impacting businesses around the world.  What will 2018 bring? In this report and webinar, IANS Faculty Aaron Turner examines the major trends in store for IT security professionals in the coming year. From the new incidents we need to prepare for to the investments we need to make to keep up with attackers' capabilities, we have our work cut out for us..

Read More »


January 3, 2018 | Insider Threats
By Mark Clancy, IANS Faculty

 Insider Threats: Know What to Watch For

Detecting and stopping insider threats requires a strong balance between people-oriented processes and technology-oriented solutions. In this Ask-an-Expert written response, IANS Faculty Mark Clancy details some common insider threat scenarios and offers tips for detecting them before they cause harm.

Read More »


December 27, 2017 | Security Analytics and Visualization
By Mark Clancy, IANS Faculty

 Anomaly Detection: A Market Landscape

Detecting anomalies across both users and networks requires a strong combination of network, endpoint detection and response (EDR), security and information event management (SIEM) capabilities and more. In this Ask-an-Expert written response, IANS Faculty Mark Clancy provides a rundown of market options, including their pros and cons.

Read More »


December 7, 2017 | Big Data
By Josh More, IANS Faculty

 Unified Data Management (UDM): A Primer

Before deploying UDM, it's important to understand what it is - and what it isn't. In this Ask-an-Expert written response, IANS Faculty Josh More provides an overview of the UDM market, including top features to look for and the capabilities of newer as-a-service offerings. He also explains why having a good level of data control is a prerequisite for UDM success.

Read More »


November 28, 2017 | Asset Discovery and Inventory
By Aaron Turner, IANS Faculty

 Create a Workable Asset Inventory

Creating an asset inventory for a large, multinational organization is a daunting task that is both difficult and expensive. In this Ask-an-Expert live interaction, IANS Faculty Aaron Turner details the process, from discovering assets, creating a service management database and determining asset ownership, to getting enough budget to pay for it all.

Read More »


November 16, 2017 | Security Information and Event Management (SIEM) and Log Management

 SIEM Use-Case Checklist

It can be easy to underestimate the time and effort required to effectively operate and manage a SIEM. This detailed, sortable checklist is designed to help organizations determine where they stand on a number of specific SIEM use-case scenarios. 

Read More »


November 2, 2017 | Security Operations Centers (SOCs)
By Dave Shackleford, IANS Faculty

 SOC Year 1: Set Realistic Expectations

Most organizations struggle to understand what a mature security operations center (SOC) should look like, let alone a fairly new one. In this Ask-an-Expert written response, IANS Faculty Dave Shackleford details some key metrics to track and some realistic expectations to set for the SOC's first year.

Read More »