We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

368 Results for: "IANS Faculty"

 



January 18, 2018 | Mobile Access and Device Management
By IANS Faculty, IANS Faculty

 Balance Security and Usability with Mobile Passcodes

When it comes to mobile device passcodes, organizations constantly search for a happy medium between security and usability. In this Ask-an-Expert live interaction, IANS Faculty Justin Wilder details the various options and recommends allowing less complex passwords and Touch ID access, but also adding compensating controls to ensure data stays safe. 

Read More »


January 18, 2018 | Threats & Incidents
By IANS Faculty, IANS Faculty

 Vulnerabilities from Aging Apps and Tech Represent Greatest Threats Facing Gov’t Agencies

216 of the 313 federal IT professionals surveyed by Grant Thornton/PSC listed vulnerabilities from aging technologies and applications as a security concern facing their agencies in 2017. Human error (174 out of 313), malware (168 out of 313) and phishing campaigns (165 out of 313) were the next most commonly reported threats.

Read More »


December 13, 2017 | Threats & Incidents
By IANS Faculty, IANS Faculty

 One-Third of Executives Don’t Know Who is Responsible for IoT Security

Organizations must have the right leadership and processes in place to drive the security measures required by digital advancements. Many businesses are just beginning this journey. For instance, the ownership of responsibility for IoT security varies depending on the organization. Achieving greater cyber resilience as a society and within organizations will require a more concerted effort to uncover and manage new risks inherent in emerging technologies.

Read More »


August 16, 2017 | Security Awareness, Phishing, Social Engineering
By IANS Faculty, IANS Faculty

 Poll: Does Tagging External Email Promote Awareness?

With phishing and email spoofing attacks on the rise, many organizations are considering tagging all external emails to raise user awareness and bolster their defenses - but is it a good idea? In this report, IANS Faculty James Tarala, Mike Pinch, Dave Kennedy and Mike Saurbaugh weigh in on the practice and offer tips for ensuring success. 

Read More »


July 31, 2017 | Incident Investigations, Handling and Tracking
By IANS Faculty, IANS Faculty

 Poll: Is It Better to Shut Down/Disconnect a Suspected Malware-Infected Device or Leave It Running?

When malware strikes, ensuring employees know and take the right steps immediately can make all the difference. In this report, IANS Faculty Mark Clancy, Dave Kennedy, Aaron Turner and Marcus Ranum weigh in on whether employees' first step should be to shut down the infected machine or contact security. 

Read More »


April 7, 2017 | Password Management
By IANS Faculty, IANS Faculty

 Poll: What Are the Best Password Strategies?

Password guidelines seems to change all the time. With new recommendations from NIST and vendors like Microsoft cropping up, how can enterprises determine the best approach? In this Faculty Viewpoint report, IANS Faculty Rich Guida, John Galda, Jason Gillam, Kevin Beaver, Marcus Ranum and Stephen McHenry offer their opinions and some rules of thumb for creating strong, enforceable password policies.

Read More »