Filter By:



Recent Blogs & Podcasts

Insights Portal


March 7, 2018 | Authentication

 Multi-Factor Authentication (MFA) Checklist

It's clear multi-factor authentication (MFA) offers a far more robust solution than passwords alone for protecting critical systems and data. In this checklist, IANS details the practical steps for choosing and implementing an enterprise-class MFA solution that helps meet regulatory requirements, facilitate realistic business operations and actually stop attacks.

Read More »

March 7, 2018 | Cloud Network and Host Controls
By Dave Shackleford, IANS Faculty

 Cloud Security Controls: A Question of Trust

When is it ok to use a cloud provider’s security controls – and when isn’t it? In this report, IANS Faculty Dave Shackleford details the latest security offerings from the likes of Amazon, Azure and Google, explains what works well and what’s still missing, and offers some good rules of thumb for deciding when to trust the security controls offered by your cloud provider.

Read More »

March 7, 2018 | Leadership Skills

 U.S. Government: Cybersecurity Posture in 2018

Compared to 12 months ago, one-quarter of respondents think the federal government’s broader IT security posture is somewhat or significantly more secure, versus nearly four in ten who thinking it is more vulnerable. When it comes their own agency’s posture, one-third believe their agency is somewhat or significantly more secure.

Read More »

March 7, 2018 | Key Technologies

 Multi-Factor Authentication Market to Reach $20.4 Billion by 2025

The increasing number of cyber attacks around the world has pushed organizations to ramp up their efforts around identity and access management. For instance, the global multifactor authentication market is expected to grow at a compound annual growth rate of (CAGR) of more than 17 percent between 2017 and 2025.

Read More »

March 6, 2018 | Budgeting, Sizing

 Top 2018 Security Investment Priorities

Guarding sensitive data (16%), endpoint protection (15%), SIEM/analytics (14%) and in-house expertise (12%) are the top security investment priorities for 2018, according to a global survey of organizations.

Read More »

March 6, 2018 | Privileged Access Management
By Andrew Carroll, IANS Faculty

 A PAM Tool Comparison (Updated)

Managing privileged users is becoming increasingly critical, but choosing the right enterprise-grade PAM tool is not straightforward. In this update to a previous Ask-an-Expert written response, IANS Faculty Andrew Carroll underscores the importance of matching the tool to the use case and adds Centrify to his comparison of CyberArk and Osirium across key use case criteria.

Read More »

March 5, 2018 | IT Service Management
By Josh More, IANS Faculty

 Ensure Critical Elements Are Included in GRC Documents, Workflows

When starting a GRC program from scratch, it can be difficult to foresee which ingredients are critical to success and which aren't. In this Ask-an-Expert written response, IANS Faculty Josh More details the critical elements to include and pitfalls to avoid, while urging a high-level focus on workflows, culture and stakeholder alignment.

Read More »