We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

104 Results for: "Aaron Shi"

 



April 5, 2018 | Encryption, Digital Signatures, Certificates, Tokenization
By Aaron Shi, IANS Director of Web Development & Security

 Ensure Your User IDs Are Encrypted

In the wake of the Equifax breach and other high-profile incidents, organizations are enforcing encryption across all PII and passwords, but what about user IDs? In this Ask-an-Expert written response, IANS Director of Web Development and Security Aaron Shi explains why user IDs are often left in the clear and offers a simple way to bring them into the encryption fold.

Read More »


May 12, 2015 | Vulnerability Assessment and Management
By Daniel Maloof, IANS Managing Editor

 Aaron Turner to Deliver a Feature Presentation at ISSA-LA Information Security Summit

When you think about the marvel that is the international cellular network, it is truly amazing to realize that the ability to communicate with one another is very nearly universal. But, as with any complex network, there are significant opportunities for attackers to exploit vulnerabilities in components of the system.

Read More »


July 2, 2018 | Patch Management
By Aaron Turner, IANS Faculty

 Apply Patching Best Practices to Network Devices

Many organizations have mature patching programs for Windows, Linux and Unix servers, but few apply the same rigor to network devices like routers, switches and load balancers. In this Ask-an-Expert written response, IANS Faculty Aaron Turner explains why that is and offers some tips for ensuring network devices are patched efficiently.

Read More »


June 19, 2018 | Encryption, Digital Signatures, Certificates, Tokenization
By Aaron Turner, IANS Faculty

 Three Success Factors for SSH Key Management

Despite the fact that most enterprises use hundreds of thousands of SSH keys on a regular basis, few have the right pieces in place to manage them effectively. In this Ask-an-Expert written response, IANS Faculty Aaron Turner says successful SSH key management depends on three factors: strong configuration management, mature service management and effective policy management.

Read More »


May 31, 2018 | Encryption, Digital Signatures, Certificates, Tokenization
By Aaron Turner, IANS Faculty

 Consider Three Cloud-Ready Encryption Options

As organizations make the move to the cloud, many are realizing it's time to re-think their current encryption toolset. In this Ask-an-Expert written response, IANS Faculty Aaron Turner suggests three cloud-ready options: AWS KMS, Azure Key Vault and Gemalto.

Read More »


May 29, 2018 | Threat Intelligence and Modeling
By Aaron Turner, IANS Faculty

 Adapt Threat Models to Thawing U.S.-North Korea Relations

Is the cyber threat from North Korea likely to lessen, now that relations between North and South Korea, as well as the U.S., seem to be progressing? Not really, says IANS Faculty Aaron Turner. In this Ask-an-Expert written response, he explains why all signs point to increased North Korean cyberattack activity instead and lists some likely targets.

Read More »


May 24, 2018 | Security Policies and Strategy
By Aaron Turner, IANS Faculty

 OTT Messaging Apps: Know the Risks

Over-the-top (OTT) messaging apps like WhatsApp and WeChat claim to offer top-notch privacy and security, but are they enterprise-ready? In this Ask-an-Expert written response, IANS Faculty Aaron Turner says that while such apps are actually more secure than email, they do have their downsides. He offers his recommendations, along with caveats around device, compliance and data retention.

Read More »