Filter By:



Recent Blogs & Podcasts

9 Results for: "James Tarala"


November 14, 2017 | Authentication
By James Tarala, IANS Faculty

 Prep Now for an MFA/PAM Future

Deploying multi-factor authentication and privileged access management to manage server admin access, elevated privileges and remote access is a good first step, but organizations should be planning now for a completely password-less future. In this Ask-an-Expert live interaction, IANS Faculty James Tarala offers a brief history of MFA and PAM, as well as tips for eventually implementing strong authentication for everyone.

Read More »

September 1, 2017 | Data Loss Prevention (DLP)
By James Tarala, IANS Faculty

 Implement DLP Effectively

The best DLP implementations go beyond technology considerations to focus on achieving business goals. In this Ask-an-Expert written response, IANS Faculty James Tarala explains how to build an effective DLP program, from creating optimal governance and data classification policies to choosing the right keywords and vendors. 

Read More »

May 10, 2017 | Desktop Virtualization (VDI)
By James Tarala, IANS Faculty

 Securing a Virtual Desktop Infrastructure (VDI) Environment

While securing a VDI environment is not very different from securing a distributed PC environment, it does require some extra thought to ensure optimal performance, incident response and access control. In this Ask-an-Expert live interaction, IANS Faculty James Tarala recommends strategies to ensure the deployment is both secure and successful.

Read More »

August 16, 2017 | Security Awareness, Phishing, Social Engineering
By IANS Faculty, IANS Faculty

 Poll: Does Tagging External Email Promote Awareness?

With phishing and email spoofing attacks on the rise, many organizations are considering tagging all external emails to raise user awareness and bolster their defenses - but is it a good idea? In this report, IANS Faculty James Tarala, Mike Pinch, Dave Kennedy and Mike Saurbaugh weigh in on the practice and offer tips for ensuring success. 

Read More »

February 23, 2017 | Malware and Advanced Threats
By Kevin Beaver, IANS Faculty

 Strategies for Thwarting State-Sponsored Hacks

State-sponsored attackers are, by definition, highly skilled and highly funded. How can we keep up? In this report, IANS Faculty Kevin Beaver details the challenges around state-sponsored hacking, including the threats, vulnerabilities and risks that must be addressed, starting today, if organizations are going to stay off their radar. 

Read More »

October 25, 2017 | Cloud Network and Host Controls
By Dave Shackleford, IANS Faculty

 Hybrid Cloud Security: Know the Fundamentals

While hybrid clouds offer more visibility and control than cloud-only environments, they also require smart architecture and security designs to keep data safe and the business as a whole up and running. In this report, IANS Faculty Dave Shackleford details the key fundamentals of hybrid cloud security, including automation, continuous monitoring and shift-left strategies designed to ensure your hybrid cloud workloads remain secure today - and over time. 

Read More »

June 27, 2016 | Cloud Access Security Brokers
By Ed Moyle, IANS Faculty

 Identity as a Service: Deciding When It Makes Sense

As more companies start using cloud services, many are considering identity as a service (IDaaS) to help simplify identity management, but is it a good idea? In this report, IANS Faculty Ed Moyle provides a quick market overview, some common use cases, and tips for deciding when IDaaS can work – and when it can’t.

Read More »