Filter By:



Recent Blogs & Podcasts

Insights Portal


March 22, 2018 | Mobile Client Devices
By Aaron Turner, IANS Faculty

 Android vs. iOS: Which Is More Secure?

Deciding whether Android or iOS devices are more secure for a corporate environment is difficult because the underlying platforms are in constant flux. In this Ask-an-Expert written response, IANS Faculty Aaron Turner says both can be secure if their OS is kept up to date, but Android 7 has a slight advantage – at least at this point in time.

Read More »

March 21, 2018 | Authentication
By James Tarala, IANS Faculty

 An Enterprise Guide to Practical MFA

Multifactor authentication (MFA) provides a more robust solution than simple passwords, and while the latest offerings are more user-friendly and easier to deploy than ever before, selecting the right implementation and feature set is no easy feat. In this webinar, IANS Faculty James Tarala details the practical steps for choosing and implementing an enterprise-class MFA solution that helps meet regulatory requirements, facilitate realistic business operations and actually stop attacks.

Read More »

March 21, 2018 | Incident Response Planning
By Kevin Beaver, IANS Faculty

 Lay the Groundwork for IR in the Cloud

Incident response is never easy, but responding quickly and effectively to an incident when key evidence is housed and managed by a cloud vendor can be even more difficult. In this report, IANS Faculty Kevin Beaver steps you through the process of putting the right pieces in place to ensure your cloud incident response is effective and efficient.

Read More »

March 20, 2018 | Managed Security Services
By Dave Shackleford, IANS Faculty

 Consider the Top MSSPs for Your SOC

How can you be sure the MSSP you choose for your SOC will be the right fit for your business and security needs? In this Ask-an-Expert written response, IANS Faculty Dave Shackleford details the main decision factors and lists the top MSSPs to consider, along with their strengths and weaknesses.

Read More »

March 16, 2018 | Threats & Incidents

 Components of a Cyber Breach Response Plan

Having a cyber breach response plan (CBRP) in place is critical for when an organization detects a breach. The CBRP must touch all parts of the organization and needs to be led by an individual who is capable of managing the operational and strategic response to a breach.

Read More »