We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:



Recent Blogs & Podcasts

Insights Portal

\ Threats & Vulnerabilities


December 13, 2018 | Malware and Advanced Threats
By Bill Brenner, IANS Faculty,
     Dave Shackleford, IANS Faculty

 2018 in Review

In this webinar, IANS Research Director Bill Brenner and IANS Faculty Dave Shackleford look back at the biggest security news trends of 2018, what made them significant and what it all could mean for the year ahead.

Read More »

November 19, 2018 | Insider Threats
By Kevin Beaver, IANS Faculty

 Mitigate Insider Threats to Source Code

Protecting source code from insider threats requires a balanced approach of process and technology. In this Ask-an-Expert live interaction, IANS Faculty Kevin Beaver says technical tools like SIEM, DLP and CASB can help, but shoring up vulnerabilities and partnering with HR is also critical. 

Read More »

November 5, 2018 | Security Awareness, Phishing, Social Engineering
By Kati Rodzon, IANS Faculty

 Security Awareness: Gaining a Measurable ROI

Once you have a security awareness program up and running, how can you prove it is providing measurable returns? In this report, IANS Faculty Kati Rodzon offers practical steps for creating metrics and identifying successful tactics that ensure business leaders pay attention and fund budget.

Read More »

October 31, 2018 | Malware and Advanced Threats
By Josh More, IANS Faculty

 The Chinese Chip Hack: What You Need to Know

A recent Bloomberg report that China planted spy chips on popular server motherboards used by the likes of Apple and Amazon is triggering an avalanche of denials and call for retraction. What's the real story? In this Ask-an-Expert live interaction, IANS Faculty Josh More explains both sides of the issue and recommends ways enterprises can protect themselves.

Read More »

October 19, 2018 | Incident Response Planning

 Ransomware Preparation and Response Checklist

Like other network events and security incidents, ransomware infections should be integrated into your overall business continuity efforts and incident response plan. This checklist steps you through the process. 

Read More »

October 5, 2018 | Malware and Advanced Threats
By Mike Saurbaugh, IANS Faculty

 IANS Vulnerability and Breach Update: Q3 2018

Vulnerabilities and breaches are mainstream news regularly. With a new vulnerability seemingly discovered daily, which should be taken more seriously (i.e., patch now!) and which are overhyped? In this quarterly research report, IANS Faculty Mike Saurbaugh updates clients on the top vulnerabilities and breaches from the past quarter and provides some real-world context and perspective.

Read More »