Filter By:



Recent Blogs & Podcasts

Insights Portal


March 29, 2018 | Insider Threats
By Mark Clancy, IANS Faculty

 Create an Effective Insider Threat Monitoring Program

Monitoring for insider threats is both important and complex, especially when privacy is also a concern. In this Ask-an-Expert live interaction, IANS Faculty Mark Clancy details the key steps to building an effective monitoring program, from deciding what and who to monitor, to ensuring employee privacy is protected. 

Read More »

March 28, 2018 | Authentication
By Aaron Turner, IANS Faculty

 Outsourced Authentication: When It Works – and When It Doesn’t

In this always-on cloud/mobile world, many organizations are outsourcing their application authentication to the likes of Google, Facebook and LinkedIn. In this report, IANS Faculty Aaron Turner explains when handing your authentication tasks to a third-party makes sense – and when it doesn’t. He also details the key decision factors to consider before making the move. 

Read More »

March 27, 2018 | Security Awareness, Phishing, Social Engineering
By Jason Gillam, IANS Faculty

 Spear-Phishing Attacks: Understanding the Risk

Spear-phishing attacks are often in the news, but how prevalent and effective are they really? In this Ask-an-Expert written response, IANS Faculty Jason Gillam offers a simple answer: Very. He also outlines some common attacks and best practices for thwarting them.

Read More »

March 26, 2018 | Incident Response Planning
By Kevin Beaver, IANS Faculty

 IR in the Cloud Checklist

Incident response (IR) is never easy, but responding quickly and effectively to an incident when key evidence is housed and managed by a cloud vendor can be even more difficult. This checklist steps through the process of creating  effective, efficient IR in the cloud.

Read More »

March 26, 2018 | Regulations & Legislation
By Marty Gomberg, IANS Faculty

 GDPR: What’s in Scope?

Organizations are scrambling to get compliant with the EU's new General Data Protection Regulation (GDPR) before it comes into force in May, but figuring out exactly what kind of data is governed by the law isn't straightforward. In this Ask-an-Expert written response, IANS Faculty Marty Gomberg clarifies the issue.

Read More »

March 22, 2018 | Cloud Network and Host Controls
By Dave Shackleford, IANS Faculty

 IANS Decision-Maker: IaaS Security Controls

For security teams, choosing security controls in the cloud can be daunting at best, and incredibly frustrating at worst. This tool is designed to help security teams make decisions on which solutions and controls make the most sense when moving workloads into IaaS environments.

Read More »