We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:



Recent Blogs & Podcasts

Insights Portal


November 26, 2018 | Threats & Incidents

 Phishing: Overview of Most Susceptible Industries

Insurance and manufacturing employees at mid-sized companies were most likely to click on a suspicious link or email or obey a fraudulent request, according to a study of 241,000 phishing tests. For larger companies, employees at non-profits and insurance firms were most susceptible to phishing attacks.

Read More »

November 21, 2018 | Risk Management
By George Gerchow, IANS Faculty

 Next-Generation GRC/IRM Tools: An Overview

The right GRC/IRM platform can make all the difference when it comes to successfully managing enterprise cybersecurity risk. In this Ask-an-Expert written response, IANS Faculty George Gerchow details key features to expect from today's tools and compares six options: Lockpath, MetricStream, RiskVision, Rsam, Risk Fabric and Allgress.

Read More »

November 19, 2018 | Threats & Incidents

 Industrial Control Systems: Top 5 Security Standards Used

Almost half (48%) of IT and industrial control systems security practitioners map their cybersecurity standards to the NIST Cyber Security Framework (CSF). Less than a quarter (22%) adhere to the North American Electric Reliability Corporation critical infrastructure protection plan (NERC CIP), a set of requirements designed to secure the assets operating North America's bulk electric system.

Read More »

November 19, 2018 | Insider Threats
By Kevin Beaver, IANS Faculty

 Mitigate Insider Threats to Source Code

Protecting source code from insider threats requires a balanced approach of process and technology. In this Ask-an-Expert live interaction, IANS Faculty Kevin Beaver says technical tools like SIEM, DLP and CASB can help, but shoring up vulnerabilities and partnering with HR is also critical. 

Read More »

November 16, 2018 | Cloud Network and Host Controls
By Mike Rothman, IANS Faculty

 Developing a More Mature Cloud Security Model

Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. In this webinar, IANS Faculty Mike Rothman explains the Securosis/IANS Cloud Security Maturity Model, how serverless functions enable continuous cloud security, and how to secure the Continuous Deployment Pipeline.

Read More »

November 16, 2018 | Threats & Incidents

 Overview of How Organizations Secure Applications

Almost two-thirds of IT and security professionals (61%) say they secure their applications by educating developers on safe coding, 59 percent use penetration testing, 53 percent use data masking during testing, and half (50%) use data and key encryption.

Read More »