Filter By:

Recent Blogs & Podcasts



July 11, 2017 | Software Development Lifecycle (SDLC)
By Jason Gillam, IANS Faculty

 Get Up to Speed on the Agile SDLC

Shifting from Waterfall to Agile can be frustrating for security teams that aren't well versed in Agile's nuances. In this Ask-an-Expert written response, IANS Faculty Jason Gillam explains the philosophy behind Agile, details the SDLC and shows how it can be used to improve software security over time. 

Read More »

July 10, 2017 | Malware and Advanced Threats
By Mike Saurbaugh, IANS Faculty

 IANS Vulnerability and Breach Update: Q2 2017

A new vulnerability or breach seems to be discovered daily, but which should be taken more seriously and which are overhyped? In this report, IANS Faculty Mike Saurbaugh looks back over the major breaches and vulnerabilities of the past three months, explains them and provides real-world context and perspective.

Read More »

July 7, 2017 | Cloud Network and Host Controls
By Dave Shackleford, IANS Faculty

 IANS Cloud Security Update: Q2 2017

As organizations continue to move services and computing assets into cloud service provider environments, the need for adequate security controls grows as well. In this quarterly research report, IANS Faculty Dave Shackleford updates IANS’ clients on the new developments occurring in the cloud security arena.

Read More »

July 5, 2017 | Data Loss Prevention (DLP)
By Josh More, IANS Faculty

 Tips for Protecting IP When Offshoring to China

Is it possible to offshore manufacturing processes to China while fully protecting corporate intellectual property (IP)? In this Ask-an-Expert live interaction, IANS Faculty Josh More recommends some key contractual, business process and security control changes to put in place to improve the odds.

Read More »

June 30, 2017 | Privileged Access Management
By Aaron Turner, IANS Faculty

 Build a Scalable Privileged Identity Management Program

The scope of the privileged identity problem continues to expand for organizations and is only exacerbated by the lack of investment in IDAM technologies. In this report, IANS Faculty Aaron Turner offers recommendations for aligning an overarching identity program with privileged user management from both a process and technology perspective. 

Read More »

June 27, 2017 | Malware and Advanced Threats
By Daniel Maloof, IANS Managing Editor

 GoldenEye Ransomware Wreaks Havoc on Global Networks

The ransomware hits keep on coming, and just like the WannaCry outbreak, this looks like a big one. For the second time in as many months, corporations around the world are experiencing a massive cyber-attack that’s once again crippling enterprise networks and demanding a Bitcoin ransom to decrypt files.

Read More »