We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:



Recent Blogs & Podcasts

Insights Portal


May 1, 2018 | Virtual Private Networks
By Dave Shackleford, IANS Faculty

 Evaluate Top VPN and Web Proxy Solutions

In addition to sporting the latest features and functions, VPN and web proxy solutions must also be easy to use and configure. In this Ask-an-Expert written response, IANS Faculty Dave Shackleford compares four VPN solutions (from Check Point, Citrix, Palo Alto and Pulse) and two web proxy solutions (from McAfee and Symantec) across both sets of criteria.

Read More »

April 30, 2018 | Fraud Detection
By Michael Pinch, IANS Faculty

 Use Benford’s Analysis to Ease Fraud Detection

Health insurance fraud detection is a bit outside most infosec professionals' comfort zones, but some simple analytics can help surface potential indicators. In this Ask-an-Expert written response, IANS Faculty Mike Pinch explains how to use Benford's law to surface anomalies in data sets and make uncovering potential fraud easier.

Read More »

April 30, 2018 | Privacy
By George Gerchow, IANS Faculty

 GDPR-Compliant Privacy Policy Template

This is a template for a very mature privacy policy that covers General Data Protection Regulation (GDPR) Articles 4, 9, 14, 17 and 30. It is designed to clearly communicate how much the company cares about data privacy, what kind of data it potentially handles and how users/customers can delete it. 

Read More »

April 30, 2018 | Threats & Incidents

 Overview of the Changes Organizations Make Following a Breach

Organizations are eager to stop repeat attacks following a breach. Some 42 percent of security professionals say their organizations increased security awareness training among employees following a breach, and 41 percent increased investment in security defense technologies.

Read More »

April 27, 2018 | Leadership Skills

 Hiring & Retention: What Are Cybersecurity Professionals Looking For?

Cybersecurity professionals say the perfect job isn’t just about the money. Two-thirds (68%) of those surveyed say they want their opinions taken seriously, and 62% prefer clearly defined responsibilities. More than half (59%) say that training and investment in technology are important when choosing a position.

Read More »

April 26, 2018 | Budgeting, Sizing

 Top Motivations for Security Spending in 2018

The top motivations for security spending among senior executives remain compliance requirements and avoiding financial penalties from a data breach in 2018. The impact of increased use of cloud computing and the fact that an organization has previously experienced a data breach are two additional motivations that have gained additional importance in 2018.

Read More »

April 26, 2018 | Fraud Detection
By Josh More, IANS Faculty

 Ensure Transactions Are Properly Vetted

While some transactions merit instant approval, others require a more stringent process to curtail fraud and keep customers secure. In this Ask-an-Expert written response, IANS Faculty Josh More explains how artificial intelligence-based tools are helping automate approvals in many cases, enabling financial institutions to reduce manual oversight while improving efficiency and security.

Read More »

April 25, 2018 | Embedded Systems and Internet of Things
By Chris Poulin, IANS Faculty

 Balancing Risk and Reward in IoT Security

Enterprises are scrambling to leverage IoT to gain market share and grow revenues, but can they address IoT's risks at the same speed and scale? In this report, IANS Faculty Chris Poulin discusses how to leverage a mix of existing and emerging infrastructure controls to build both a short- and long-term enterprise security strategy for IoT.

Read More »