We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:



Recent Blogs & Podcasts

Insights Portal

\ Security Operations


November 16, 2018 | Security Information and Event Management (SIEM) and Log Management

 Log Monitoring Checklist

This checklist presents the most common/important logs to review and what to focus on within the log data. 

Read More »

November 5, 2018 | Security Awareness, Phishing, Social Engineering
By Kati Rodzon, IANS Faculty

 Security Awareness: Gaining a Measurable ROI

Once you have a security awareness program up and running, how can you prove it is providing measurable returns? In this report, IANS Faculty Kati Rodzon offers practical steps for creating metrics and identifying successful tactics that ensure business leaders pay attention and fund budget.

Read More »

September 27, 2018 | Security Analytics and Visualization

 Track Security Processes Efficiently

Efficiently tracking and managing security alerts, investigations, research and IoCs requires more than an Excel spreadsheet. In this Ask-an-Expert written response, IANS Faculty Mick Douglas presents the pros and cons of three common methods.

Read More »

August 29, 2018 | Big Data
By Marcus Ranum, IANS Faculty

 AI and ML Demystified

Vendors are all hopping on the artificial intelligence (AI) and machine learning (ML) bandwagon, but how can you cut through the hype and understand how to leverage AI and ML for practical security capabilities? In this report, IANS Faculty Marcus Ranum details exactly where AI and ML stand today, and offers some guidance for determining if/when they can help solve real security problems.

Read More »

June 19, 2018 | Encryption, Digital Signatures, Certificates, Tokenization
By Aaron Turner, IANS Faculty

 Three Success Factors for SSH Key Management

Despite the fact that most enterprises use hundreds of thousands of SSH keys on a regular basis, few have the right pieces in place to manage them effectively. In this Ask-an-Expert written response, IANS Faculty Aaron Turner says successful SSH key management depends on three factors: strong configuration management, mature service management and effective policy management.

Read More »