We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

Insights Portal

 



June 25, 2018 | Security Policies and Strategy
By Jake Williams, IANS Faculty

 Create an Acceptable Use Policy for a Culture of Trust

Security needs to walk a fine line when creating acceptable use policies that both outline consequences and foster a culture of trust. In this Ask-an-Expert written response, IANS Faculty Jake Williams provides a policy roadmap, and stresses the importance of being clear about what is and isn't being monitored, and why.

Read More »


June 21, 2018 | Vulnerability Assessment and Management
By Kevin Beaver, IANS Faculty

 Best Practices in Database Vulnerability Management

Beyond data encryption and access monitoring, how can organizations ensure the data within their SQL Server, DB2 and Oracle databases are secure? In this Ask-an-Expert written response, IANS Faculty Kevin Beaver recommends performing authenticated vulnerability scans in addition to implementing in-depth penetration testing, monitoring and other controls.

Read More »


June 19, 2018 | Encryption, Digital Signatures, Certificates, Tokenization
By Aaron Turner, IANS Faculty

 Three Success Factors for SSH Key Management

Despite the fact that most enterprises use hundreds of thousands of SSH keys on a regular basis, few have the right pieces in place to manage them effectively. In this Ask-an-Expert written response, IANS Faculty Aaron Turner says successful SSH key management depends on three factors: strong configuration management, mature service management and effective policy management.

Read More »