We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

Insights Portal

 


August 29, 2018 | Big Data
By Marcus Ranum, IANS Faculty

 AI and ML Demystified

Vendors are all hopping on the artificial intelligence (AI) and machine learning (ML) bandwagon, but how can you cut through the hype and understand how to leverage AI and ML for practical security capabilities? In this report, IANS Faculty Marcus Ranum details exactly where AI and ML stand today, and offers some guidance for determining if/when they can help solve real security problems.

Read More »


August 28, 2018 | Threats & Incidents

 Phishing: Overview of Industry Click Rates After Training

Click rates on phishing emails decreased significantly following 90 days of employee training and even more so after one year of training. For business services, for instance, the click rate was 14 percent after 90 days of training and just 1 percent after a year of training.

Read More »


August 27, 2018 | Cloud Application and Data Controls
By Shannon Lietz, IANS Faculty

 Cloud-Based Audit and Compliance: Know the Pitfalls

The key to audit and compliance success in the cloud is to realize each cloud provider addresses the issue differently. In this Ask-an-Expert written response, IANS Faculty Shannon Lietz offers tips on dealing with cloud logging, obtaining inspection-level capabilities, using serverless architecture and handling antivirus, access management, object storage and more.

Read More »


August 23, 2018 | Application Development and Testing
By Kevin Beaver, IANS Faculty

 Secure Lab/Test Environments Effectively

Lab and test environments are seldom hardened, patched or properly managed. In this Ask-an-Expert written response, IANS Faculty Kevin Beaver recommends going beyond policy and offers tips to ensure test/lab environments meet baseline security requirements.

Read More »


August 23, 2018 | Leadership Skills

 66% of Cybersecurity Professionals Want More Training

Two-thirds of security workers surveyed said they could still use some training to handle the security functions that they’re required to do. Meanwhile, about 34% believe they have the skills they need to do their job effectively.

Read More »


August 22, 2018 | Software-Defined Networking

 IANS Decision-Maker: Microsegmentation Scenarios

Once your environment is highly virtualized, likely with some use of public cloud as well, the use of microsegmentation tools and controls for network isolation and access control will come up. But how can you tell if this is a technology you need? This tool steps you through three main scenarios and their decision factors.

Read More »