We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

Insights Portal

 



July 23, 2018 | Threats & Incidents

 Overview of Top Malicious Email Themes in 2017

Emails with the word “Bill” in a subject line topped the list of malicious email themes in 2017. The subject line “email delivery failure” and those involving legal or law enforcement subjects came in a close second and third, respectively.

Read More »


July 19, 2018 | Incident Response Planning

 Tabletop Scenario Templates

This document contains templates for six tabletop scenarios designed to test an organization's incident response plan across several key incident types, from ransomware and denial-of-service attacks to lost/stolen mobile devices and more. 

Read More »


July 19, 2018 | Regulations & Legislation
By Josh More, IANS Faculty

 California‚Äôs New Privacy Law: Impacts and Advice

In late June, California rushed the nation’s first modern privacy law to completion.  In this report, IANS Faculty Josh More explains the timing and specifics of the law, how it stacks up against the EU's GDPR and how organizations can ensure they become compliant by the time the law comes into force in January 2020.

Read More »


July 18, 2018 | Insider Threats
By Dave Kennedy, IANS Faculty

 Insider Threat Software: Know the Options

Strong insider threat programs require a potent mix of people, processes and technology, but visibility is the most important piece. In this Ask-an-Expert written response, IANS Faculty Dave Kennedy recommends focusing on SIEM, UBA, DLP, EDR and other tool sets, and provides a list of likely vendor candidates.

Read More »


July 17, 2018 | Encryption, Digital Signatures, Certificates, Tokenization
By Josh More, IANS Faculty

 Blockchain and Digital Currencies: Why They Matter Now

Blockchain and digital currencies are hot topics in the news and the board room, but security teams are just now putting them on their radar. In this report, IANS Faculty Josh More details how the technologies work, how the system is being exploited and what organizations can do to protect themselves.

Read More »


July 17, 2018 | Authentication
By Michael Pinch, IANS Faculty

 Blockchain as an Infosec Strength and Weakness

As crypto currency trading grows more popular, people are hearing a lot about how the Blockchain is key to making it all work. Meanwhile, security experts are talking more about the technology as a defensive asset and, if abused, a dangerous threat vector. In this webinar, IANS Faculty Michael Pinch walks through how Blockchain came about, how it works and how it’s central to managing digital currency transactions. He also reviews how it can be used to bolster security, how the bad guys can exploit it to launch attacks, and what organizations can do to protect themselves.

Read More »