We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:



Recent Blogs & Podcasts

Insights Portal


May 31, 2018 | Encryption, Digital Signatures, Certificates, Tokenization
By Aaron Turner, IANS Faculty

 Consider Three Cloud-Ready Encryption Options

As organizations make the move to the cloud, many are realizing it's time to re-think their current encryption toolset. In this Ask-an-Expert written response, IANS Faculty Aaron Turner suggests three cloud-ready options: AWS KMS, Azure Key Vault and Gemalto.

Read More »

May 30, 2018 | Incident Investigations, Handling and Tracking
By Bill Dean, IANS Faculty

 Incident Cheat Sheet: When to Contact Law Enforcement

In the heat of an incident, it can be difficult to determine if/when law enforcement notification is required. This cheat sheet provides a list of common security incident types along with the required/suggested external party that should be involved with each. 

Read More »

May 29, 2018 | Threat Intelligence and Modeling
By Aaron Turner, IANS Faculty

 Adapt Threat Models to Thawing U.S.-North Korea Relations

Is the cyber threat from North Korea likely to lessen, now that relations between North and South Korea, as well as the U.S., seem to be progressing? Not really, says IANS Faculty Aaron Turner. In this Ask-an-Expert written response, he explains why all signs point to increased North Korean cyberattack activity instead and lists some likely targets.

Read More »

May 28, 2018 | Leadership Skills

 Overview of Most Important Security Controls, Governance Practices

Some 69% of IT security leaders say that appointing an executive-level security leader to head an enterprise-wide strategy is the most important governance practice. Creating a cross-function committee on IT security and communicating with the board of directors were also cited by more than half of cybersecurity professionals as important.

Read More »

May 24, 2018 | Security Policies and Strategy
By Aaron Turner, IANS Faculty

 OTT Messaging Apps: Know the Risks

Over-the-top (OTT) messaging apps like WhatsApp and WeChat claim to offer top-notch privacy and security, but are they enterprise-ready? In this Ask-an-Expert written response, IANS Faculty Aaron Turner says that while such apps are actually more secure than email, they do have their downsides. He offers his recommendations, along with caveats around device, compliance and data retention.

Read More »

May 23, 2018 | Threat Detection and Hunt Teaming
By Ondrej Krehel, IANS Faculty

 Mature Your Threat Hunting Program

How sophisticated is your threat hunting program? No matter your level, the key to success is in collecting and analyzing the right data sets with the right tools, people and processes. In this report, IANS Faculty Ondrej Krehel explains the different levels of threat hunting maturity and offer tips for moving up the scale and incrementally improving your program.

Read More »