Filter By:

Recent Blogs & Podcasts

Insights

\ Security Operations 



August 28, 2017 | Metrics and Reporting
By Paul Asadoorian, IANS Faculty

 Confirm and Compare Your Attack Rate

Determining whether an attack is real can be difficult, but quantifying your overall attack rate with any certainty is even trickier. In this Ask-an-Expert written response, IANS Faculty Paul Asadoorian details common methods for quantifying attacks and understanding how your attack rate compares with others in your industry.

Read More »


August 17, 2017 | Vulnerability Assessment and Management
By Kevin Beaver, IANS Faculty

 Expand Vulnerability Scanning and Assessments in a Highly Regulated, Tightly Staffed Environment

Vulnerability management within a large, highly regulated environment is time-consuming and complicated. In this live Ask-an-Expert written interaction, IANS Faculty Kevin Beaver suggests leveraging a current MSSP relationship to improve visibility, expand capabilities and get a jump start on better managing the process.

Read More »


June 22, 2017 | Metrics and Reporting
By Rich Guida, IANS Faculty

 Choose Your Risk Metrics Wisely

We all know we need to measure information security risk appropriately, but what are the best methodologies and metrics to use? In this Ask-an-Expert written response, IANS Faculty Rich Guida explains how to use a risk register to identify critical metrics, and offers tips for gathering relevant data and handling reporting.

Read More »


May 3, 2017 | Security Analytics and Visualization
By Stephen McHenry, IANS Faculty

 Applying User and Entity Behavioral Analytics (UEBA) to Improve Security

As the market for user and entity behavioral analytics (UEBA) solutions continues to evolve, the need for these types of solutions will increase. At the same time, UEBA also poses challenges related to privacy, data security, policy and deployment/storage options. In this report, IANS Faculty Stephen McHenry examines the current state of the UEBA marketplace and offers some scenarios in which it could prove effective for organizations today and in the future. 

Read More »


March 7, 2017 | Security Operations Centers (SOCs)
By Mike Rothman, IANS Faculty

 Overcoming Resistance to SOC Data Collection

How can you run an effective security operations center (SOC) when operations won't provide you with the right data? In this Ask-an-Expert live interaction, IANS Faculty Mike Rothman outlines some potential reasons for operations' lack of cooperation and provides strategies for overcoming them.

Read More »