We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

Insights Portal

 


October 19, 2018 | Team Structure and Management
By Bruce Bonsall, IANS Faculty

 Grow Your Infosec Program Over Time

When the business is expected to double in five years, information security needs a growth plan as well. In this Ask-an-Expert written response, IANS Faculty Bruce Bonsall uses specific results from IANS' Organizational Engagement and Technical Diagnostics to help a team focus on immediate and long-term steps.

Read More »


October 19, 2018 | Incident Response Planning

 Ransomware Preparation and Response Checklist

Like other network events and security incidents, ransomware infections should be integrated into your overall business continuity efforts and incident response plan. This checklist steps you through the process. 

Read More »


October 18, 2018 | Threats & Incidents

 Security/Business Leaders Often Not Aligned on Biggest Enterprise Cyber Threats

Business and security leaders differ in many areas on the the top cyber threat to enterprise data. While 20 percent of business leaders think ransomware is the biggest threat, only 18 percent of security and IT leaders share that view. Security leaders are more concerned than business leaders (18% vs. 15%) when it comes to APTs and social engineering (12% vs. 8%).

Read More »


October 17, 2018 | Privacy
By George Gerchow, IANS Faculty

 GDPR 5 Months Later: Where You Should Be By Now

The deadline to comply with the European Union’s data protection regulation was May 25, but for many organizations the work is just beginning. Myriad questions remain for individual companies as to the size and scope of what they must do to be in compliance. In this webinar, IANS Faculty George Gerchow walks through where you should be and how to get there.

Read More »


October 17, 2018 | Key Technologies

 Overview of the Use of Multi-Factor Authentication

Organizations use passwords only instead of multi-factor authentication on homegrown or on-premises apps (75%), Mac machines (72%) and privileged account management products (57%). Multifactor authentication is used over passwords only by more organizations on Windows machines (55%), SaaS apps (51%) and for access to virtual private networks (50%).

Read More »


October 17, 2018 | Authentication
By Aaron Turner, IANS Faculty

 Best Practices in Mobile App Authentication

Is there a way to ensure mobile app users authenticate securely without ruining the native app experience? In this Ask-an-Expert live interaction, IANS Faculty Aaron Turner offers several tips, from reducing initial friction but elevating authentication at purchase, to protecting against brute-force attacks and credential-stealing malware.

Read More »