We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

Insights Portal

 


September 19, 2018 | Regulations & Legislation
By Rebecca Herold, IANS Faculty

 5 Steps to California Privacy Law Compliance

The new California Consumer Privacy Act of 2018 (CA-AB375) is a major step forward in U.S. consumer privacy regulations, but ensuring compliance is no simple matter. In this written Ask-an-Expert response, IANS Faculty Rebecca Herold provides a high-level five-step process organizations can follow.

Read More »


September 18, 2018 | Threats & Incidents

 Bug Bounties: U.S. Companies Pay Out the Most

U.S. companies spent $25.4 million paying out bug bounties in 2017 – far outpacing any other country. Canadian companies, in a distant second place, spent $1.5 million, and U.K. companies spent just under $1 million paying out bug bounties.

Read More »


September 18, 2018 | Embedded Systems and Internet of Things
By Chris Poulin, IANS Faculty

 IoT Risks and Rewards

Security experts have discussed the Internet of Things as a target for some time, but the 2016 coordinated assault against Dyn, one of several companies hosting the Domain Name System (DNS), brought the dangers into clearer focus. To better understand what we're dealing with, a deeper dive into the IoT is necessary. This live webinar with IANS Faculty Chris Poulin examines where the vulnerabilities are, and what can be done to improve the security behind the technology.

Read More »


September 17, 2018 | Team Structure and Management
By Mike Saurbaugh, IANS Faculty

 IT vs. Security: Which Team Owns Which Tools?

Most organizations use a variety of tools to streamline and secure the business, but determining proper governance and tool "ownership" between security and IT can be challenging. In this Ask-an-Expert written response, IANS Faculty Mike Saurbaugh explains what tool ownership entails and provides examples of common ways to divvy up responsibilities.

Read More »


September 14, 2018 | Budgeting, Sizing

 Top Security Spending Priorities in 2018

Data governance and intrusion detection/prevention are the top security spending priorities in 2018 for 23 percent of Chief Security Officers. Some 21 percent of CSOs chose identity and access management as a top security spending priority, followed by security analytics at 20 percent.

Read More »