We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:



Recent Blogs & Podcasts

Insights Portal

\ Security Operations


September 27, 2018 | Security Analytics and Visualization

 Track Security Processes Efficiently

Efficiently tracking and managing security alerts, investigations, research and IoCs requires more than an Excel spreadsheet. In this Ask-an-Expert written response, IANS Faculty Mick Douglas presents the pros and cons of three common methods.

Read More »

August 29, 2018 | Big Data
By Marcus Ranum, IANS Faculty

 AI and ML Demystified

Vendors are all hopping on the artificial intelligence (AI) and machine learning (ML) bandwagon, but how can you cut through the hype and understand how to leverage AI and ML for practical security capabilities? In this report, IANS Faculty Marcus Ranum details exactly where AI and ML stand today, and offers some guidance for determining if/when they can help solve real security problems.

Read More »

June 19, 2018 | Encryption, Digital Signatures, Certificates, Tokenization
By Aaron Turner, IANS Faculty

 Three Success Factors for SSH Key Management

Despite the fact that most enterprises use hundreds of thousands of SSH keys on a regular basis, few have the right pieces in place to manage them effectively. In this Ask-an-Expert written response, IANS Faculty Aaron Turner says successful SSH key management depends on three factors: strong configuration management, mature service management and effective policy management.

Read More »

June 12, 2018 | Metrics and Reporting
By Marcus Ranum, IANS Faculty

 Create Metrics to Show Security’s Business ROI

Dollar-based metrics may get executives' attention, but are they the right tools to use to promote information security across an organization? In this Ask-an-Expert written response, IANS Faculty Marcus Ranum steps through the process of creating actionable security metrics and suggests focusing on staff time vs. dollars when reporting to top management.

Read More »

May 22, 2018 | Security Information and Event Management (SIEM) and Log Management
By Michael Pinch, IANS Faculty

 Help Operations Understand the Importance of Log Monitoring

Faced with the log monitoring prowess of mature cybersecurity teams, some IT operations staffers are starting to believe they no longer need to participate in log management/monitoring. In this Ask-an-Expert written response, IANS Faculty Mike Pinch explains why this is a mistake, citing both IT operational excellence frameworks and the need for a layered defense.

Read More »

May 21, 2018 | Security Information and Event Management (SIEM) and Log Management
By Jake Williams, IANS Faculty

 Train the Team on the SIEM Basics

Bringing SIEM duties in-house after an outsourcing arrangement requires in-house staff be brought up to speed quickly. In this Ask-an-Expert written response, IANS Faculty Jake Williams suggests focusing training on three areas: configuration/maintenance, log management and alert management.

Read More »

May 2, 2018 | Vulnerability Assessment and Management
By Dave Shackleford, IANS Faculty

 Vulnerability Management in a Post-Equifax World

After the Equifax debacle, upper management cares now more than ever before about vulnerability management. How can you use this new spotlight to take your program to the next level? In this report, IANS Faculty Dave Shackleford explains how to drive the right incentives, build the right metrics framework and get IT on board  for a successful, comprehensive vulnerability/patch management program. 


Read More »

March 29, 2018 | Insider Threats
By Mark Clancy, IANS Faculty

 Create an Effective Insider Threat Monitoring Program

Monitoring for insider threats is both important and complex, especially when privacy is also a concern. In this Ask-an-Expert live interaction, IANS Faculty Mark Clancy details the key steps to building an effective monitoring program, from deciding what and who to monitor, to ensuring employee privacy is protected. 

Read More »