We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:



Recent Blogs & Podcasts

Insights Portal


May 3, 2018 | Recruiting, Hiring and Retention

 Cybersecurity Skills Gap: Too Many Threats, Too Few Professionals

The global shortfall of information security professionals is expected to reach 3.5 million by 2021, according to Cybersecurity Ventures. Meanwhile, organizations believe only half of the applicants they receive for infosec positions are qualified for the jobs, and another 53 percent of organizations face delays as long as six months to find and hire qualified candidates.

Read More »

May 3, 2018 | Enterprise and IT Compliance Management
By Josh More, IANS Faculty

 Limit PCI Scope During Payment Processor Transitions

Outsourcing payment processing to a third-party is a great way to limit PCI scope, but issues with migrating data can also lead to vendor lock-in. In this Ask-an-Expert written response, IANS Faculty Josh More suggests some ways to limit PCI scope while transitioning to new processors, including maintaining a "shadow" database.

Read More »

May 2, 2018 | Vulnerability Assessment and Management
By Dave Shackleford, IANS Faculty

 Vulnerability Management in a Post-Equifax World

After the Equifax debacle, upper management cares now more than ever before about vulnerability management. How can you use this new spotlight to take your program to the next level? In this report, IANS Faculty Dave Shackleford explains how to drive the right incentives, build the right metrics framework and get IT on board  for a successful, comprehensive vulnerability/patch management program. 


Read More »

May 2, 2018 | Vulnerability Assessment and Management
By Dave Shackleford, IANS Faculty

 Vulnerability Management Process Workflow

In most organizations, vulnerability management is as difficult as it is critical. This tool is designed to clarify the process by providing a basic vulnerability management workflow, including all steps and participants. 

Read More »

May 2, 2018 | Threats & Incidents

 Overview of Risk Assessments on Corporate Cyber Activities

Fewer than half of organizations have conducted a cyber attack vulnerability assessment in the last two years, and even fewer (30%) have reviewed their cyber response plan. A total of 54 percent of respondents said their organization has completed a general fraud risk assessment in the past two years.

Read More »

May 1, 2018 | Key Technologies

 How DevSecOps Improves Cloud Deployments

Secure DevOps integrates security reviews, implementation of security controls, and deployment of security technology with the DevOps approach that many teams already use, to move into the cloud. Cloud deployment is improved by automating security services across the full development cycle and making them available via APIs.

Read More »

May 1, 2018 | Threats & Incidents

 Breach Analysis: Overview of Impacted Functions

The operations function of a business is most affected by a security breach, according to security professionals, followed by finance, intellectual property and brand reputation. Customer retention is also a major concern, as 25 percent of surveyed professionals said this was their most impacted area following a security breach.

Read More »