Filter By:

Recent Blogs & Podcasts

Insights

\ Security Operations 



November 16, 2017 | Security Information and Event Management (SIEM) and Log Management

 SIEM Use-Case Checklist

It can be easy to underestimate the time and effort required to effectively operate and manage a SIEM. This detailed, sortable checklist is designed to help organizations determine where they stand on a number of specific SIEM use-case scenarios. 

Read More »


November 2, 2017 | Security Operations Centers (SOCs)
By Dave Shackleford, IANS Faculty

 SOC Year 1: Set Realistic Expectations

Most organizations struggle to understand what a mature security operations center (SOC) should look like, let alone a fairly new one. In this Ask-an-Expert written response, IANS Faculty Dave Shackleford details some key metrics to track and some realistic expectations to set for the SOC's first year.

Read More »


October 18, 2017 | Configuration and Change Management
By Marcus Ranum, IANS Faculty

 Configuration Management: Driving the Future of Security

Strong configuration management not only eases operational tasks like desktop and server deployments, but it also helps improve security, especially as organizations move to newer on-demand and software-defined networking environments. In this report, IANS Faculty Marcus Ranum details the vital role configuration management plays in today's environments, and offers tips for building a comprehensive program that will help drive security well into the future.

Read More »


October 16, 2017 | Security Information and Event Management (SIEM) and Log Management

 SIEM Strategy Checklist

SIEM products represent a major investment in time and money, and deciding which one is right for a given enterprise is a complex process. With the stakes for selecting the right system so high – and the penalties for bad SIEM decisions so onerous – it’s vital that security professionals carefully consider a number of key factors. To take some of the mystery and risk out of the process, use this checklist as your guide to making the correct SIEM choice for your organization.

Read More »


October 16, 2017 | Security Information and Event Management (SIEM) and Log Management
By Raffy Marty, IANS Faculty

 Implementing Your Big Data and SIEM Plans: 10 Challenges to Solve First

SIEM deployments can be challenging for many reasons: scalability, visibility, insights, etc. But is the SIEM really to blame? In this webinar, IANS Faculty Raffy Marty explores some of the reasons why you might not be getting the full benefits from your SIEM and details some of the challenges around moving to an alternative big-data solution.

Read More »


September 29, 2017 | Vulnerability Assessment and Management
By Dave Shackleford, IANS Faculty

 Toning Up the Vulnerability Management Core

When it comes to safeguarding your organization, it's the security basics, not the shiny new widgets, that get the job done. In this report, IANS Lead Faculty Dave Shackleford details the fundamental technology controls required to tone up your vulnerability management core, including inventory management/maintenance, patch management and implementing rigorous configuration controls that meet or exceed industry best practices. 

Read More »


August 28, 2017 | Metrics and Reporting
By Paul Asadoorian, IANS Faculty

 Confirm and Compare Your Attack Rate

Determining whether an attack is real can be difficult, but quantifying your overall attack rate with any certainty is even trickier. In this Ask-an-Expert written response, IANS Faculty Paul Asadoorian details common methods for quantifying attacks and understanding how your attack rate compares with others in your industry.

Read More »


August 17, 2017 | Vulnerability Assessment and Management
By Kevin Beaver, IANS Faculty

 Expand Vulnerability Scanning and Assessments in a Highly Regulated, Tightly Staffed Environment

Vulnerability management within a large, highly regulated environment is time-consuming and complicated. In this live Ask-an-Expert written interaction, IANS Faculty Kevin Beaver suggests leveraging a current MSSP relationship to improve visibility, expand capabilities and get a jump start on better managing the process.

Read More »