We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

40 Results for: "Bill Dean"

 


April 23, 2018 | Endpoints
By Bill Dean, IANS Faculty

 Endpoint Detection and Response (EDR): A Market Overview

With more than 60 options to choose from, determining the best EDR solution for your environment can become overwhelming fast. In this Ask-an-Expert written response, IANS Faculty Bill Dean details the decision factors and suggests considering offerings in both the "security trinity" and standalone categories. 

Read More »


April 11, 2018 | Threat Intelligence and Modeling
By Bill Dean, IANS Faculty

 Make Sense of Your Threat Intel

With all the threat feeds and intelligence sources out there, how can you choose – and use – the right ones for your specific infosec program and use cases? In this report, IANS Faculty Bill Dean offers practical tips for choosing the right feeds, integrating the data and ensuring you successfully leverage threat intel to proactively detect/prevent attacks.

Read More »


June 14, 2017 | IT Forensics
By Bill Dean, IANS Faculty

 Use the Right Process – and Tools – to Investigate Potentially Compromised Machines

Getting a secure process in place to remotely investigate potentially compromised devices - one that can't be used as a pivot point for further attack - is tricky. In this Ask-an-Expert written response, IANS Faculty Bill Dean validates a client's current process but also recommends installing a temporary forensics agent to improve the analysis.

Read More »


January 26, 2017 | Threat Intelligence and Modeling
By Bill Dean, IANS Faculty

 Pros and Cons of CISA’s Threat-Sharing Program

With the passage of CISA and with DHS’ Automated Indicator Sharing (AIS) program getting up and running, organizations interested in sharing threat intelligence can now consider automating the process. How can they ensure their automated feed is scrubbed of PII and won’t leave them open to liability or privacy concerns? In this report, IANS Faculty Bill Dean offers tips for sharing threat indicators both automatically and safely.

Read More »


September 21, 2016 | Insider Threats
By Bill Dean, IANS Faculty

 Insider Threats: Understanding the Risks

Insider threats can often pose a greater risk to an organization than external actors. In this Ask-an-Expert written response, IANS Faculty Bill Dean offers some key statistics regarding insider threats and provides a number of steps organizations can take to anticipate and prepare for the risks posed by insiders.

Read More »


August 15, 2016 | Incident Response Planning
By Bill Dean, IANS Faculty

 Creating Effective Tabletop Exercises

Designed correctly, tabletop exercises can help you determine how well your people, processes and technologies are prepared for an incident – and improve that preparation over time. In this report, IANS Faculty Bill Dean steps you through the process of designing, planning and executing effective tabletop exercises. 

Read More »


July 21, 2016 | Penetration Testing and Red Teaming
By Bill Dean, IANS Faculty

 Examining Top Penetration Testing Tools

As the features and functionality of vulnerability assessment and penetration tools continue to evolve, a number of vendors have begun to enter the spaces. In this Ask-an-Expert written response, IANS Faculty Bill Dean details the various open-source and commercial tools available and offers factors to consider for choosing the most effective solutions. 

Read More »


May 26, 2016 | IT Forensics
By Bill Dean, IANS Faculty

 Mobile Device Forensics: A Tools Overview

Mobile device forensics tools in the marketplace today vary greatly in both capability and price. In this Ask-an-Expert written response, IANS Faculty Bill Dean assesses a number of these solutions and explains that budget and the types of mobile phones in your environment are the two main factors for selecting the right forensics tool.

Read More »


May 3, 2016 | Endpoints
By Bill Dean, IANS Faculty

 Designing the Ideal Endpoint Security Solution

The endpoint protection space has continued to evolve over the past few years. In this Ask-an-Expert written response, IANS Faculty Bill Dean offers recommendations for creating the optimal endpoint protection solution through a combination of prevention technologies and visibility tools.

Read More »


September 18, 2015 | Security Information and Event Management (SIEM) and Log Management
By Bill Dean, IANS Faculty

 Choosing the Right Commercial Threat Feed for a LogRhythm Environment

The benefits of threat intelligence are becoming increasingly clear for security professionals, but which feeds are the most effective when it comes to automating intelligence into a SIEM? In this Ask-an-Expert written response, IANS Faculty Bill Dean explains that when it comes to threat intelligence, organizations should focus on preventing targeted attacks, and lists a number of useful commercial and open-source threat feeds.

Read More »