We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

110 Results for: "Aaron Turner"

 



August 16, 2018 | Embedded Systems and Internet of Things
By Aaron Turner, IANS Faculty

 Gauge Threats Against City Surveillance Systems

The internet of things (IoT) is often targeted by malicious actors, but what type of threats are most common for city surveillance systems such as red light/speed cameras? In this Ask-an-Expert written response, IANS Faculty Aaron Turner says to watch out for cryptocurrency opportunists, among others.

Read More »


August 8, 2018 | Mobile Client Devices
By Aaron Turner, IANS Faculty

 Create a Practical Mobile Security Roadmap

Mobile devices in the enterprise are simply a given today. So why are they so difficult to secure? In this report, IANS Faculty Aaron Turner provides some key insights into the true risk of top mobile platforms like Apple iOS and Google Android, and offers practical strategies for properly managing and securing them.

Read More »


July 2, 2018 | Patch Management
By Aaron Turner, IANS Faculty

 Apply Patching Best Practices to Network Devices

Many organizations have mature patching programs for Windows, Linux and Unix servers, but few apply the same rigor to network devices like routers, switches and load balancers. In this Ask-an-Expert written response, IANS Faculty Aaron Turner explains why that is and offers some tips for ensuring network devices are patched efficiently.

Read More »


June 19, 2018 | Encryption, Digital Signatures, Certificates, Tokenization
By Aaron Turner, IANS Faculty

 Three Success Factors for SSH Key Management

Despite the fact that most enterprises use hundreds of thousands of SSH keys on a regular basis, few have the right pieces in place to manage them effectively. In this Ask-an-Expert written response, IANS Faculty Aaron Turner says successful SSH key management depends on three factors: strong configuration management, mature service management and effective policy management.

Read More »


May 31, 2018 | Encryption, Digital Signatures, Certificates, Tokenization
By Aaron Turner, IANS Faculty

 Consider Three Cloud-Ready Encryption Options

As organizations make the move to the cloud, many are realizing it's time to re-think their current encryption toolset. In this Ask-an-Expert written response, IANS Faculty Aaron Turner suggests three cloud-ready options: AWS KMS, Azure Key Vault and Gemalto.

Read More »


May 29, 2018 | Threat Intelligence and Modeling
By Aaron Turner, IANS Faculty

 Adapt Threat Models to Thawing U.S.-North Korea Relations

Is the cyber threat from North Korea likely to lessen, now that relations between North and South Korea, as well as the U.S., seem to be progressing? Not really, says IANS Faculty Aaron Turner. In this Ask-an-Expert written response, he explains why all signs point to increased North Korean cyberattack activity instead and lists some likely targets.

Read More »