We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

9 Results for: "Jake Williams"

 



June 25, 2018 | Security Policies and Strategy
By Jake Williams, IANS Faculty

 Create an Acceptable Use Policy for a Culture of Trust

Security needs to walk a fine line when creating acceptable use policies that both outline consequences and foster a culture of trust. In this Ask-an-Expert written response, IANS Faculty Jake Williams provides a policy roadmap, and stresses the importance of being clear about what is and isn't being monitored, and why.

Read More »


May 21, 2018 | Security Information and Event Management (SIEM) and Log Management
By Jake Williams, IANS Faculty

 Train the Team on the SIEM Basics

Bringing SIEM duties in-house after an outsourcing arrangement requires in-house staff be brought up to speed quickly. In this Ask-an-Expert written response, IANS Faculty Jake Williams suggests focusing training on three areas: configuration/maintenance, log management and alert management.

Read More »


May 17, 2018 | Threat Intelligence and Modeling
By Jake Williams, IANS Faculty

 Threat Modeling: Three Basic Approaches to Consider

With so many threat modeling approaches available, how do you choose the right one for your particular environment? In this Ask-an-Expert written response, IANS Faculty Jake Williams recommends three approaches designed to help model threats against PaaS and IaaS cloud assets, in addition to a range of other attacks.

Read More »


April 17, 2018 | Penetration Testing and Red Teaming
By Jake Williams, IANS Faculty

 Avoid Common Issues with Live Red Team Exercises

Red team exercises provide valuable insight into an organization's defenses, but running them against live environments can be dicey. In this Ask-an-Expert live interaction, IANS Faculty Jake Williams details how to get a red team program up and running, and offers tips for conducting live exercises without adversely affecting the business.

Read More »


April 9, 2018 | Intrusion Prevention/Detection (IPS/IDS)
By Jake Williams, IANS Faculty

 Choose the Best IDS/IPS for a New Wide-Area Network

An IDS/IPS is a critical WAN security control, but choosing the right one for your environment requires some research. In this Ask-an-Expert written response, IANS Faculty Jake Williams details the key criteria to consider and suggests evaluating solutions from four main vendors: Check Point, Cisco, McAfee and WatchGuard.

Read More »


April 2, 2018 | Threat Intelligence and Modeling
By Jake Williams, IANS Faculty

 Build a More Formal, Automated CTI Program

Moving from an ad hoc, manual cyber threat intelligence (CTI) program to one that is more formal and automated is not complicated, as long as you follow the right steps. In this Ask-an-Expert written response, IANS Faculty Jake Williams explains the five-step CTI lifecycle and details key pitfalls to avoid.

Read More »


July 6, 2018 | Malware and Advanced Threats
By Mike Saurbaugh, IANS Faculty

 IANS Vulnerability and Breach Update: Q2 2018

Vulnerabilities and breaches are mainstream news regularly. With a new vulnerability seemingly discovered daily, which should be taken more seriously (i.e., patch now!) and which are overhyped? In this quarterly research report, IANS Faculty Mike Saurbaugh updates clients on the top vulnerabilities and breaches from the past quarter and provides some real-world context and perspective.

Read More »


November 20, 2015 | Application Development and Testing
By Josh Corman, IANS Faculty

 Best Practices in Securing Microservices Architecture Development

Moving to rapid development and continuous delivery of microservices puts a strain on traditional application and code testing models. In this Ask-an-Expert live interaction, IANS Faculty Josh Corman explains the security pros and cons of microservices and underscores the increased importance of threat modeling and software hygiene in this fast-paced environment.

Read More »