Filter By:

Recent Blogs & Podcasts



June 27, 2017 | Vendor and Partner Management
By Josh More, IANS Faculty

 Set Smart Minimum Vendor Security Requirements

As organizations increase the number of third-party vendors on their networks, ensuring all those vendors meet at least minimum security standards becomes exponentially difficult. In this Ask-an-Expert written response, Josh More explains how to ease the process by taking more of a risk-centric approach to the problem.

Read More »

June 26, 2017 | Malware and Advanced Threats
By Dave Shackleford, IANS Faculty

 Comparing Email Security Solutions

Data loss prevention, malware detection and eDiscovery are all important components of email security, but how can organizations distinguish one such solution from another? In this Ask-an-Expert written response, IANS Faculty Dave Shackleford compares four email security vendors and offers tips for implementing them. 

Read More »

June 22, 2017 | Metrics and Reporting
By Rich Guida, IANS Faculty

 Choose Your Risk Metrics Wisely

We all know we need to measure information security risk appropriately, but what are the best methodologies and metrics to use? In this Ask-an-Expert written response, IANS Faculty Rich Guida explains how to use a risk register to identify critical metrics, and offers tips for gathering relevant data and handling reporting.

Read More »

June 22, 2017 | Threat Intelligence and Modeling
By Dave Shackleford, IANS Faculty

 Beef Up Your Threat Intelligence By Leveraging Internal Success

In the past year, we've experienced some of the largest, most impactful cyber-attacks in history, and one step organizations are taking to defend themselves is to make better use of threat intelligence. In this report, IANS Faculty Dave Shackleford details best practices for effectively gathering internal security event data, identifying external threat intelligence sources and integrating this data into your SIEM platforms and standalone collectors. 

Read More »

June 19, 2017 | Privacy
By Rebecca Herold, IANS Faculty

 Building a Framework for Data Privacy and Protection in the Cloud

With more and more security incidents originating in the cloud, new data privacy and protection regulations are emerging. Cloud services must establish and maintain effective privacy and compliance programs, while organizations that leverage cloud services need to establish sound frameworks for mitigating risks in their own right. In this webinar, IANS Faculty Rebecca Herold reviews the most common risks cloud services must address and details specific steps organizations can take to prevent breaches and the corresponding penalties.   

Read More »