We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:



Recent Blogs & Podcasts

Insights Portal


July 10, 2018 | Threats & Incidents

 IoT: Overview of Device Risk Management Responsibility

There is no clear consensus on who is responsible for managing risks associated with IoT devices in an organization. About one-third of governance professionals say it’s the CISO, another third say it’s the GM or VP of lines of business, and 36% say no one person has oversight over managing IoT device risk.

Read More »

July 9, 2018 | Security Policies and Strategy
By Kevin Beaver, IANS Faculty

 Tips for Security Policy/Standard Success

No security policy should be established without first performing a comprehensive risk assessment and ensuring everything ties back to business goals. In this Ask-an-Expert written response, IANS Faculty Kevin Beaver offers a step-by-step guide for putting successful security policies/standards in place.

Read More »

July 6, 2018 | Malware and Advanced Threats
By Mike Saurbaugh, IANS Faculty

 IANS Vulnerability and Breach Update: Q2 2018

Vulnerabilities and breaches are mainstream news regularly. With a new vulnerability seemingly discovered daily, which should be taken more seriously (i.e., patch now!) and which are overhyped? In this quarterly research report, IANS Faculty Mike Saurbaugh updates clients on the top vulnerabilities and breaches from the past quarter and provides some real-world context and perspective.

Read More »

July 5, 2018 | Cloud Network and Host Controls
By Dave Shackleford, IANS Faculty

 IANS Cloud Security Update: Q2 2018

As organizations continue to move services and computing assets into cloud service provider environments, the need for adequate security controls grows as well. In this quarterly research report, IANS Faculty Dave Shackleford updates IANS’ clients on the new developments occurring in the cloud security arena.

Read More »

July 3, 2018 | Architecture, Configuration and Segmentation
By Dave Shackleford, IANS Faculty

 Overview of Illumio for Microsegmentation

Illumio promises to ease the process of deploying and managing microsegmentation, but what are its pros and cons? In this Ask-an-Expert written response, IANS Faculty Dave Shackleford explains how Illumio works and discusses its comparative complexity, ease of use/management and cost, among other aspects. 

Read More »

July 2, 2018 | Patch Management
By Aaron Turner, IANS Faculty

 Apply Patching Best Practices to Network Devices

Many organizations have mature patching programs for Windows, Linux and Unix servers, but few apply the same rigor to network devices like routers, switches and load balancers. In this Ask-an-Expert written response, IANS Faculty Aaron Turner explains why that is and offers some tips for ensuring network devices are patched efficiently.

Read More »

June 28, 2018 | Architecture, Configuration and Segmentation
By John Strand, IANS Faculty

 Thwart Attacker Lateral Movement Via Host Firewalls

While antivirus and endpoint integrity products offer key capabilities, host firewalls should also be a core part of most organizations' defense-in-depth strategies. In this Ask-an-Expert live interaction, IANS Faculty John Strand explains how workstation firewalls can stop nearly 95 percent of attacks in their tracks and offers tips for easy, effective deployment.

Read More »