We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

Insights Portal

\ Vendor Management 



July 30, 2018 | Vendor and Partner Management

 Security Tool Optimization Workflow

When planning a project to optimize and streamline security vendors and tools, it’s key to have a strategy. This workflow is designed to help you evaluate existing security tools and vendors, and plan for a more lean, efficient security tool strategy in the future. For more, see Optimize Your Vendor Toolset.

Read More »


July 25, 2018 | Vendor and Partner Management
By Dave Shackleford, IANS Faculty

 Optimize Your Vendor Toolset

Security teams typically find they accumulate too many security tools, many of which may overlap in scope or provide less value over time. In this report, IANS Faculty Dave Shackleford explains how to put the right processes in place to ensure you continually re-evaluate your critical toolsets and more fully optimize your operations. 

Read More »


May 14, 2018 | Vendor and Partner Management
By Josh More, IANS Faculty

 Protect Vendor/Supplier Transactions and Payments

With all the incidents of business email compromise and payment system abuse in the news, many organizations are looking to better secure their vendor/supplier payment processes. In this live Ask-an-Expert interaction, IANS Faculty Josh More details two-factor authentication, out-of-band verification and other strategies to help fortify systems against such attacks.

Read More »


May 3, 2018 | Enterprise and IT Compliance Management
By Josh More, IANS Faculty

 Limit PCI Scope During Payment Processor Transitions

Outsourcing payment processing to a third-party is a great way to limit PCI scope, but issues with migrating data can also lead to vendor lock-in. In this Ask-an-Expert written response, IANS Faculty Josh More suggests some ways to limit PCI scope while transitioning to new processors, including maintaining a "shadow" database.

Read More »


March 21, 2018 | Incident Response Planning
By Kevin Beaver, IANS Faculty

 Lay the Groundwork for IR in the Cloud

Incident response is never easy, but responding quickly and effectively to an incident when key evidence is housed and managed by a cloud vendor can be even more difficult. In this report, IANS Faculty Kevin Beaver steps you through the process of putting the right pieces in place to ensure your cloud incident response is effective and efficient.

Read More »


March 20, 2018 | Managed Security Services
By Dave Shackleford, IANS Faculty

 Consider the Top MSSPs for Your SOC

How can you be sure the MSSP you choose for your SOC will be the right fit for your business and security needs? In this Ask-an-Expert written response, IANS Faculty Dave Shackleford details the main decision factors and lists the top MSSPs to consider, along with their strengths and weaknesses.

Read More »


February 5, 2018 | Vendor and Partner Management
By Aaron Turner, IANS Faculty

 Understand and Manage Offshore Contractor Risk

Using offshore contractors in countries like India presents a host of risks, beyond those faced when working with U.S.-based third parties. In this Ask-an-Expert written response, IANS Faculty Aaron Turner urges companies to focus on both geopolitical and human risk factors when choosing an overseas partner.

Read More »