We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:



Recent Blogs & Podcasts

Insights Portal


August 3, 2018 | AppDev Frameworks

 Container Security Checklist

Several security elements are the same for both container-based design and traditional use of virtual machines, but they have some fundamental differences as well. This checklist steps through the process of hardening the container host system, securing the daemon, implementing network management and more.

Read More »

August 2, 2018 | Data Classification

 RFP Template for Data Tagging

This document provides an easy-to-customize template for a request for proposal (RFP) that can be used to evaluate data tagging and classification vendors.

Read More »

August 1, 2018 | Threats & Incidents

 End Users Are the Weakest Links in IT Security Defenses

More than a third of security professionals believe that end users who violate security policies are the weakest like in enterprise IT defenses. Another 18% blame a lack of security architecture and planning that goes beyond ”firefighting,” while 7 percent point to an overabundance of SIEM data.

Read More »

August 1, 2018 | AppDev Frameworks
By Josh More, IANS Faculty

 Containerization: Know the Pros and Cons

As more DevOps organizations shift from virtualization technologies to container platforms like Docker, they quickly find configuring and locking down these container environments is no easy task. In this report, IANS Faculty Josh More details the advantages and risks of containerization tools, and offers tips for securing them properly.

Read More »

July 30, 2018 | Vendor and Partner Management

 Security Tool Optimization Workflow

When planning a project to optimize and streamline security vendors and tools, it’s key to have a strategy. This workflow is designed to help you evaluate existing security tools and vendors, and plan for a more lean, efficient security tool strategy in the future. For more, see Optimize Your Vendor Toolset.

Read More »

July 30, 2018 | Team Structure and Management
By Mike Saurbaugh, IANS Faculty

 Help the Business Understand Security’s Roles and Responsibilities

The business can't fully support information security unless it first understands its function and mission within the organization. In this Ask-an-Expert written response, IANS Faculty Mike Saurbaugh explains the difference between cyber and infosecurity, details typical infosec responsibilities and offers tips for gaining security buy-in from the business.

Read More »