We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

236 Results for: "Josh More"

 



September 12, 2018 | Vendor and Partner Management
By Josh More, IANS Faculty

 Elevate Your Third-Party Risk Management Program

Third parties allow businesses to be nimble, increase profitability and gain a competitive advantage – but not without risk. In this report, IANS Faculty Josh More explains how to elevate your third-party risk program and move beyond basic questionnaires to a rigorous program to protect your business and your brand.

Read More »


August 1, 2018 | AppDev Frameworks
By Josh More, IANS Faculty

 Containerization: Know the Pros and Cons

As more DevOps organizations shift from virtualization technologies to container platforms like Docker, they quickly find configuring and locking down these container environments is no easy task. In this report, IANS Faculty Josh More details the advantages and risks of containerization tools, and offers tips for securing them properly.

Read More »


July 19, 2018 | Regulations & Legislation
By Josh More, IANS Faculty

 California‚Äôs New Privacy Law: Impacts and Advice

In late June, California rushed the nation’s first modern privacy law to completion.  In this report, IANS Faculty Josh More explains the timing and specifics of the law, how it stacks up against the EU's GDPR and how organizations can ensure they become compliant by the time the law comes into force in January 2020.

Read More »


July 17, 2018 | Encryption, Digital Signatures, Certificates, Tokenization
By Josh More, IANS Faculty

 Blockchain and Digital Currencies: Why They Matter Now

Blockchain and digital currencies are hot topics in the news and the board room, but security teams are just now putting them on their radar. In this report, IANS Faculty Josh More details how the technologies work, how the system is being exploited and what organizations can do to protect themselves.

Read More »


May 14, 2018 | Vendor and Partner Management
By Josh More, IANS Faculty

 Protect Vendor/Supplier Transactions and Payments

With all the incidents of business email compromise and payment system abuse in the news, many organizations are looking to better secure their vendor/supplier payment processes. In this live Ask-an-Expert interaction, IANS Faculty Josh More details two-factor authentication, out-of-band verification and other strategies to help fortify systems against such attacks.

Read More »


May 3, 2018 | Enterprise and IT Compliance Management
By Josh More, IANS Faculty

 Limit PCI Scope During Payment Processor Transitions

Outsourcing payment processing to a third-party is a great way to limit PCI scope, but issues with migrating data can also lead to vendor lock-in. In this Ask-an-Expert written response, IANS Faculty Josh More suggests some ways to limit PCI scope while transitioning to new processors, including maintaining a "shadow" database.

Read More »