We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

11 Results for: "James Tarala"

 



June 18, 2018 | Password Management
By James Tarala, IANS Faculty

 Best Practices in Password Protection

With the recent spate of high-profile data breaches, many organizations are re-evaluating their password protection policies. In this Ask-an-Expert live interaction, IANS Faculty James Tarala offers a simple recipe for password protection, but says forward-looking organizations should also be preparing now for an MFA future.

Read More »


March 21, 2018 | Authentication
By James Tarala, IANS Faculty

 An Enterprise Guide to Practical MFA

Multifactor authentication (MFA) provides a more robust solution than simple passwords, and while the latest offerings are more user-friendly and easier to deploy than ever before, selecting the right implementation and feature set is no easy feat. In this webinar, IANS Faculty James Tarala details the practical steps for choosing and implementing an enterprise-class MFA solution that helps meet regulatory requirements, facilitate realistic business operations and actually stop attacks.

Read More »


November 14, 2017 | Authentication
By James Tarala, IANS Faculty

 Prep Now for an MFA/PAM Future

Deploying multi-factor authentication and privileged access management to manage server admin access, elevated privileges and remote access is a good first step, but organizations should be planning now for a completely password-less future. In this Ask-an-Expert live interaction, IANS Faculty James Tarala offers a brief history of MFA and PAM, as well as tips for eventually implementing strong authentication for everyone.

Read More »


September 1, 2017 | Data Loss Prevention (DLP)
By James Tarala, IANS Faculty

 Implement DLP Effectively

The best DLP implementations go beyond technology considerations to focus on achieving business goals. In this Ask-an-Expert written response, IANS Faculty James Tarala explains how to build an effective DLP program, from creating optimal governance and data classification policies to choosing the right keywords and vendors. 

Read More »


May 10, 2017 | Desktop Virtualization (VDI)
By James Tarala, IANS Faculty

 Securing a Virtual Desktop Infrastructure (VDI) Environment

While securing a VDI environment is not very different from securing a distributed PC environment, it does require some extra thought to ensure optimal performance, incident response and access control. In this Ask-an-Expert live interaction, IANS Faculty James Tarala recommends strategies to ensure the deployment is both secure and successful.

Read More »


August 16, 2017 | Security Awareness, Phishing, Social Engineering
By IANS Faculty, IANS Faculty

 Poll: Does Tagging External Email Promote Awareness?

With phishing and email spoofing attacks on the rise, many organizations are considering tagging all external emails to raise user awareness and bolster their defenses - but is it a good idea? In this report, IANS Faculty James Tarala, Mike Pinch, Dave Kennedy and Mike Saurbaugh weigh in on the practice and offer tips for ensuring success. 

Read More »


February 23, 2017 | Malware and Advanced Threats
By Kevin Beaver, IANS Faculty

 Strategies for Thwarting State-Sponsored Hacks

State-sponsored attackers are, by definition, highly skilled and highly funded. How can we keep up? In this report, IANS Faculty Kevin Beaver details the challenges around state-sponsored hacking, including the threats, vulnerabilities and risks that must be addressed, starting today, if organizations are going to stay off their radar. 

Read More »


October 25, 2017 | Cloud Network and Host Controls
By Dave Shackleford, IANS Faculty

 Hybrid Cloud Security: Know the Fundamentals

While hybrid clouds offer more visibility and control than cloud-only environments, they also require smart architecture and security designs to keep data safe and the business as a whole up and running. In this report, IANS Faculty Dave Shackleford details the key fundamentals of hybrid cloud security, including automation, continuous monitoring and shift-left strategies designed to ensure your hybrid cloud workloads remain secure today - and over time. 

Read More »