Filter By:

Type

Topic

Recent Blogs & Podcasts

Insights Portal

 



February 2, 2018 | Threats & Incidents

 Overview of Root Causes of 2017 Cyber Attacks

A wide variety of tactics were used to commit cyber attacks in 2017. Survey respondents say that attacks on their organizations most often took advantage of software vulnerabilities (25%) while other attacks targeted corporate websites. (21%). Employee error was also cited as a common root cause of cyber attacks (19%).

Read More »


February 1, 2018 | Firewalls, NGFW
By Aaron Turner, IANS Faculty

 Address SSL Inspection Privacy and Performance Concerns

Most organizations agree that inspecting SSL traffic is critical to detecting and preventing all kinds of malware, but many let privacy and performance concerns hold them back from implementing the feature. In this Ask-an-Expert written response, IANS Faculty Aaron Turner offers practical steps for implementing SSL inspection without adversely impacting user privacy or application performance.

Read More »


February 1, 2018 | Risk Management

 IANS Risk Register Tool (Updated)

Building a Risk Register is a critical undertaking for organizations of all sizes, and there are a number of factors that contribute to its accuracy and success. This tool (updated to include the latest PCI DSS 3.2 requirements) offers a step-by-step guide for identifying risk and harm, calculating exposure and adopting appropriate security controls. 

Read More »


January 31, 2018 | Threats & Incidents

 Overview of Cyber Attackers in 2017

External parties were among the key perpetrators of cyber attacks in 2017, including random cyber criminals (34%), competitors (23%), and vendors/suppliers (18%). However, insiders are also key perpetrators, usually through errors.

Read More »


January 31, 2018 | Vulnerability Assessment and Management
By Marcus Ranum, IANS Faculty

 Structure a Low-Profile Bug Bounty Program

While Google's bug bounty program is well designed and provides rich rewards, not every organization can operate at that high level. In this Ask-an-Expert live interaction, IANS Faculty Marcus Ranum describes how to build a well-structured, low-profile program that encourages participation using a more realistic reward scale. 

Read More »


January 30, 2018 | Enterprise and IT Compliance Management

 IANS General Data Protection Regulation (GDPR) Checklist

With all the noise, panic and questions about the EU’s new General Data Protection Regulation (GDPR), it’s difficult to discern the right mix of policies, procedures and technologies to ensure compliance. This checklist helps prioritize the practical steps you can take today to ensure your organization is fully prepared when the ruling comes into full force this May.

Read More »