We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

104 Results for: "Aaron Turner"

 



July 2, 2018 | Patch Management
By Aaron Turner, IANS Faculty

 Apply Patching Best Practices to Network Devices

Many organizations have mature patching programs for Windows, Linux and Unix servers, but few apply the same rigor to network devices like routers, switches and load balancers. In this Ask-an-Expert written response, IANS Faculty Aaron Turner explains why that is and offers some tips for ensuring network devices are patched efficiently.

Read More »


June 19, 2018 | Encryption, Digital Signatures, Certificates, Tokenization
By Aaron Turner, IANS Faculty

 Three Success Factors for SSH Key Management

Despite the fact that most enterprises use hundreds of thousands of SSH keys on a regular basis, few have the right pieces in place to manage them effectively. In this Ask-an-Expert written response, IANS Faculty Aaron Turner says successful SSH key management depends on three factors: strong configuration management, mature service management and effective policy management.

Read More »


May 31, 2018 | Encryption, Digital Signatures, Certificates, Tokenization
By Aaron Turner, IANS Faculty

 Consider Three Cloud-Ready Encryption Options

As organizations make the move to the cloud, many are realizing it's time to re-think their current encryption toolset. In this Ask-an-Expert written response, IANS Faculty Aaron Turner suggests three cloud-ready options: AWS KMS, Azure Key Vault and Gemalto.

Read More »


May 29, 2018 | Threat Intelligence and Modeling
By Aaron Turner, IANS Faculty

 Adapt Threat Models to Thawing U.S.-North Korea Relations

Is the cyber threat from North Korea likely to lessen, now that relations between North and South Korea, as well as the U.S., seem to be progressing? Not really, says IANS Faculty Aaron Turner. In this Ask-an-Expert written response, he explains why all signs point to increased North Korean cyberattack activity instead and lists some likely targets.

Read More »


May 24, 2018 | Security Policies and Strategy
By Aaron Turner, IANS Faculty

 OTT Messaging Apps: Know the Risks

Over-the-top (OTT) messaging apps like WhatsApp and WeChat claim to offer top-notch privacy and security, but are they enterprise-ready? In this Ask-an-Expert written response, IANS Faculty Aaron Turner says that while such apps are actually more secure than email, they do have their downsides. He offers his recommendations, along with caveats around device, compliance and data retention.

Read More »


May 15, 2018 | Security Policies and Strategy
By Aaron Turner, IANS Faculty

 Ensure Employees Follow Acceptable Use Guidelines

In the age of social media, ensuring employees know and follow acceptable use guidelines for corporate assets is both more difficult and more critical. In this Ask-an-Expert written responses, IANS Faculty Aaron Turner says behavior-driven policies and frequent reminders about data monitoring, storage and disclosure obligations are key.

Read More »


April 24, 2018 | Security Policies and Strategy
By Aaron Turner, IANS Faculty

 Set Optimal Policies for Securing NLP Devices

Consumer digital assistants (CDAs) that use natural language processing (NLP) are proliferating, but are Alexa and Siri safe for the enterprise? In this Ask-an-Expert written response, IANS Faculty Aaron Turner details why CDAs are not enterprise-ready and should not be allowed on corporate networks, but he does offer some rules of thumb for creating enterprise-ready NLP solutions. 

Read More »


April 19, 2018 | Account Provisioning
By Aaron Turner, IANS Faculty

 Cloud Provisioning: Know the Issues

The good news for cloud identity management? Authentication standards are solid. The bad news? Authorization standards are nowhere near as mature. In this Ask-an-Expert written response, IANS Faculty Aaron Turner details the many challenges in cloud provisioning and recommends focusing on making role-based access control (RBAC) as efficient as possible.

Read More »