We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

Insights Portal

 



May 14, 2018 | Encryption, Digital Signatures, Certificates, Tokenization

 EFAIL Vulnerability Exposes Encrypted Email

On May 14, 2018, security researchers tweeted details and launched a website (efail.de) explaining how attackers could exploit “EFAIL” vulnerabilities to extract plain text from encrypted emails. The vulnerability impacts both the Pretty Good Privacy (PGP) and S/MIME methods of email encryption, which are commonly used in Microsoft Outlook. 

Read More »


May 14, 2018 | Vendor and Partner Management
By Josh More, IANS Faculty

 Protect Vendor/Supplier Transactions and Payments

With all the incidents of business email compromise and payment system abuse in the news, many organizations are looking to better secure their vendor/supplier payment processes. In this live Ask-an-Expert interaction, IANS Faculty Josh More details two-factor authentication, out-of-band verification and other strategies to help fortify systems against such attacks.

Read More »


May 14, 2018 | Threat Detection and Hunt Teaming
By Dave Kennedy, IANS Faculty

 Threat Hunting: Why Proactive Matters

Attackers keep evolving their tactics, making it increasingly difficult for traditional forensic techniques to keep up. It’s time to get proactive – and that’s where threat hunting comes into play. In this webinar, IANS Faculty Dave Kennedy explains why threat hunting is important, and how hunt teams can directly increase the overall maturity (and ROI) of your monitoring and detection capabilities. He also details specific methods for detecting abnormal patterns of behavior and other tactics hunters can use to hone their craft.

Read More »


May 10, 2018 | Regulations & Legislation
By Rebecca Herold, IANS Faculty

 Overview of Privacy Laws in South America

While privacy legislation in South America tends to follow trends set by European regulations in general, each of the 12 countries in the region has its own unique rules and protections. In this Ask-an-Expert written response, IANS Faculty Rebecca Herold offers a country-by-country breakdown of South American privacy laws and protections.

Read More »