Filter By:

Recent Blogs & Podcasts



June 22, 2017 | Threat Intelligence and Modeling
By Dave Shackleford, IANS Faculty

 Beef Up Your Threat Intelligence By Leveraging Internal Success

In the past year, we've experienced some of the largest, most impactful cyber-attacks in history, and one step organizations are taking to defend themselves is to make better use of threat intelligence. In this report, IANS Faculty Dave Shackleford details best practices for effectively gathering internal security event data, identifying external threat intelligence sources and integrating this data into your SIEM platforms and standalone collectors. 

Read More »

June 22, 2017 | Metrics and Reporting
By Rich Guida, IANS Faculty

 Choose Your Risk Metrics Wisely

We all know we need to measure information security risk appropriately, but what are the best methodologies and metrics to use? In this Ask-an-Expert written response, IANS Faculty Rich Guida explains how to use a risk register to identify critical metrics, and offers tips for gathering relevant data and handling reporting.

Read More »

June 19, 2017 | Privacy
By Rebecca Herold, IANS Faculty

 Building a Framework for Data Privacy and Protection in the Cloud

With more and more security incidents originating in the cloud, new data privacy and protection regulations are emerging. Cloud services must establish and maintain effective privacy and compliance programs, while organizations that leverage cloud services need to establish sound frameworks for mitigating risks in their own right. In this webinar, IANS Faculty Rebecca Herold reviews the most common risks cloud services must address and details specific steps organizations can take to prevent breaches and the corresponding penalties.   

Read More »

June 14, 2017 | Malware and Advanced Threats
By Chris Gonsalves, IANS Director of Technology Research

 Jon Condra on Dark Web Threats and Nation-State Attackers

It's a dangerous world out there, and guys like Jon Condra are here to help us make sense of it. The Director of East Asian Research and Analysis at risk and threat intelligence firm Flashpoint, Jon joins me this week to talk about the recent Flashpoint Business Risk Intelligence Decision Report he authored and share his insights on emerging threats from Russia, China, North Korea and a host of other international bad actors.

Read More »

June 14, 2017 | IT Forensics
By Bill Dean, IANS Faculty

 Use the Right Process – and Tools – to Investigate Potentially Compromised Machines

Getting a secure process in place to remotely investigate potentially compromised devices - one that can't be used as a pivot point for further attack - is tricky. In this Ask-an-Expert written response, IANS Faculty Bill Dean validates a client's current process but also recommends installing a temporary forensics agent to improve the analysis.

Read More »

June 13, 2017 | Malware and Advanced Threats
By Mike Saurbaugh, IANS Faculty

 Tips for Evaluating Malware Analysis Tools

Free or commercial? On-premises or cloud? API or no? Options abound when it comes to choosing the right malware analysis tool. In this Ask-an-Expert written response, IANS Faculty Mike Saurbaugh steps you through the decision process and provides an overview of the top solutions on the market.

Read More »