Filter By:

Recent Blogs & Podcasts

69 Results for: "Aaron Turner"

 



May 12, 2015 | Vulnerability Assessment and Management
By Daniel Maloof, IANS Managing Editor

 Aaron Turner to Deliver a Feature Presentation at ISSA-LA Information Security Summit

When you think about the marvel that is the international cellular network, it is truly amazing to realize that the ability to communicate with one another is very nearly universal. But, as with any complex network, there are significant opportunities for attackers to exploit vulnerabilities in components of the system.

Read More »


July 21, 2017 | Encryption, Digital Signatures, Certificates, Tokenization
By Aaron Turner, IANS Faculty

 Full Disk Encryption: Some Keys to Success

Full disk encryption is the best way to protect data at rest, but not all implementations are equally secure. In this Ask-an-Expert written response, IANS Faculty Aaron Turner highlights key regulatory and technology issues to consider, and provides tips for getting the deployment right.

Read More »


June 30, 2017 | Privileged Access Management
By Aaron Turner, IANS Faculty

 Build a Scalable Privileged Identity Management Program

The scope of the privileged identity problem continues to expand for organizations and is only exacerbated by the lack of investment in IDAM technologies. In this report, IANS Faculty Aaron Turner offers recommendations for aligning an overarching identity program with privileged user management from both a process and technology perspective. 

Read More »


June 2, 2017 | Authentication
By Aaron Turner, IANS Faculty

 Authentication: Past, Present and Future

Authentication methods and protocols have changed a lot over the years, but which are best suited to today's complex enterprise environments? In this Ask-an-Expert written response, IANS Faculty Aaron Turner provides an overview of the most used (and effective) authentication protocols.

Read More »


May 26, 2017 | Mobile Client Devices
By Aaron Turner, IANS Faculty

 Cellular Vulnerabilities: How to Fix These Hidden Risks

When it comes to the risks posed by cellular networks, enterprise security professionals don't know what they don't know. In this report, IANS Faculty Aaron Turner details the most pressing vulnerabilities and threats associated with cellular networks and offers some strategic steps security teams can take to help mitigate these threats and limit risk exposure. 

Read More »


May 11, 2017 | Cloud Application and Data Controls
By Aaron Turner, IANS Faculty

 Securing Cloud Assets Using Federated Identities

Whether you view the cloud as infrastructure-, platform- or application-as-a-service, identity is the only control that exists universally across all cloud environments. Unfortunately, identity lifecycle management for cloud-based systems is not as mature as we need it to be. In this report, IANS Faculty Aaron Turner details how to make wise investments in a federated identity strategy that can scale to even the most complex cloud technology models.

Read More »


May 10, 2017 | Authentication
By Aaron Turner, IANS Faculty

 Implementing Contactless MFA across a PKI Environment

Implementing contactless multifactor authentication (MFA) across an entire organization is difficult enough, without the added stress of getting it operational by year end to meet the tight deadline of DFARS compliance. In this Ask-an-Expert written response, IANS Faculty Aaron Turner recommends taking a phased approach to ensure a seamless rollout. 

Read More »