Filter By:

Recent Blogs & Podcasts

Insights

 



July 7, 2017 | Cloud Network and Host Controls
By Dave Shackleford, IANS Faculty

 IANS Cloud Security Update: Q2 2017

As organizations continue to move services and computing assets into cloud service provider environments, the need for adequate security controls grows as well. In this quarterly research report, IANS Faculty Dave Shackleford updates IANS’ clients on the new developments occurring in the cloud security arena.

Read More »


July 5, 2017 | Data Loss Prevention (DLP)
By Josh More, IANS Faculty

 Tips for Protecting IP When Offshoring to China

Is it possible to offshore manufacturing processes to China while fully protecting corporate intellectual property (IP)? In this Ask-an-Expert live interaction, IANS Faculty Josh More recommends some key contractual, business process and security control changes to put in place to improve the odds.

Read More »


June 30, 2017 | Privileged Access Management
By Aaron Turner, IANS Faculty

 Build a Scalable Privileged Identity Management Program

The scope of the privileged identity problem continues to expand for organizations and is only exacerbated by the lack of investment in IDAM technologies. In this report, IANS Faculty Aaron Turner offers recommendations for aligning an overarching identity program with privileged user management from both a process and technology perspective. 

Read More »


June 27, 2017 | Vendor and Partner Management
By Josh More, IANS Faculty

 Set Smart Minimum Vendor Security Requirements

As organizations increase the number of third-party vendors on their networks, ensuring all those vendors meet at least minimum security standards becomes exponentially difficult. In this Ask-an-Expert written response, Josh More explains how to ease the process by taking more of a risk-centric approach to the problem.

Read More »


June 27, 2017 | Malware and Advanced Threats
By Daniel Maloof, IANS Managing Editor

 GoldenEye Ransomware Wreaks Havoc on Global Networks

The ransomware hits keep on coming, and just like the WannaCry outbreak, this looks like a big one. For the second time in as many months, corporations around the world are experiencing a massive cyber-attack that’s once again crippling enterprise networks and demanding a Bitcoin ransom to decrypt files.

Read More »


June 26, 2017 | Malware and Advanced Threats
By Dave Shackleford, IANS Faculty

 Comparing Email Security Solutions

Data loss prevention, malware detection and eDiscovery are all important components of email security, but how can organizations distinguish one such solution from another? In this Ask-an-Expert written response, IANS Faculty Dave Shackleford compares four email security vendors and offers tips for implementing them. 

Read More »