We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:



Recent Blogs & Podcasts

Insights Portal


September 6, 2018 | Budgeting, Sizing

 Overview of the Financial Impact of a Data Breach

While the biggest costs from a data breach come from improving software and infrastructure ($193k), factors such as damage to credit ratings/insurance premiums ($180k) and training internal staff ($137k) are also having a major impact on organizations that suffer data breaches.

Read More »

September 6, 2018 | Firewalls, NGFW
By Dave Shackleford, IANS Faculty

 UTM Firewalls: An Overview

When choosing firewalls for unified threat management (UTM) appliances, organizations need to balance feature set with firepower. In this Ask-an-Expert written response, IANS Faculty Dave Shackleford presents the pros and cons of options from Check Point, Palo Alto, Fortinet and Cisco.

Read More »

September 5, 2018 | Penetration Testing and Red Teaming
By Joff Thyer, IANS Faculty

 Harness the Power of Purple Teaming

The collaborative power of purple teaming is tough to beat, but what's the best way to get started? In this report, IANS Faculty Joff Thyer details the requisite roles, responsibilities, tools and technologies for conducting effective purple team exercises.

Read More »

September 5, 2018 | Budgeting, Sizing

 Top Drivers of Security Spend Between 2017 and 2018

Half of Chief Security Officers surveyed say that rising compliance requirements have become a top driver of incremental security spending in 2018, up from 33 percent in 2017. Some 44 percent say that refreshing technology for new functionality drives security spending today, up from 38 percent in 2017.

Read More »

September 4, 2018 | Threats & Incidents

 Overview of the Types of Cyber Attackers

The advent of low-cost hacking tools is widening the attacker landscape. According to Swiss RE Economic Research and Consulting, the four main groups of cyber attackers are amateurs, hacktivists, organized crime and state-sponsored actors, each with different levels of resources at their disposal, motivations and sophistication levels.

Read More »