We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:



Recent Blogs & Podcasts

Insights Portal


October 10, 2018 | Leadership Skills

 Presenting to the Board: Four Tips for CISOs

When speaking with the board, CISOs should describe cybersecurity in broader risk management terms, tell a story, leverage visually appealing charts and graphs to show measurements and metrics, and avoid trying to completely own cyber risk themselves. Instead, get the board on your side and let directors do some of the thinking to help set strategy.

Read More »

October 10, 2018 | Threats & Incidents

 93% of CEOs Keep Company Data on Personal Devices

An overwhelming majority of CEOs (93%) keep copies of their work on a personal device outside of official company storage, which stresses the importance of using strong, complex passwords and two-factor authentication even on non-work devices.

Read More »

October 5, 2018 | Malware and Advanced Threats
By Mike Saurbaugh, IANS Faculty

 IANS Vulnerability and Breach Update: Q3 2018

Vulnerabilities and breaches are mainstream news regularly. With a new vulnerability seemingly discovered daily, which should be taken more seriously (i.e., patch now!) and which are overhyped? In this quarterly research report, IANS Faculty Mike Saurbaugh updates clients on the top vulnerabilities and breaches from the past quarter and provides some real-world context and perspective.

Read More »

October 5, 2018 | Security Policies and Strategy

 Zero-Trust Zone Acceptable Use Policy Template

This template provides an acceptable use policy for a system within a zero-trust network zone, including detailed expectations, consequences for violations, and obligations during and after access.

Read More »