We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:



Recent Blogs & Podcasts

7 Results for: "Justin Leapline"


December 6, 2018 | DevOps Organization and Strategy
By Justin Leapline, IANS Faculty

 Avoid Compliance Headaches with DevOps

Is it possible to comply with traditional regulatory mandates for separation of duties, change control, etc., in a  DevOps environment? In this Ask-an-Expert written response, Justin Leapline details how good planning, processes and automation can help improve not only compliance but security.

Read More »

February 6, 2018 | Security Information and Event Management (SIEM) and Log Management
By Justin Searle, IANS Faculty

 Strike the Right Balance When Logging Windows Events

Deciding what to log - and what not to log - is more of art than a science. In this Ask-an-Expert written response, IANS Faculty Justin Searle recommends starting with regulatory requirements and Microsoft's audit policy recommendations, as well as using the Suspect subscription to ensure  Windows event logs stay manageable and actionable.

Read More »

January 18, 2018 | Mobile Access and Device Management
By IANS Faculty, IANS Faculty

 Balance Security and Usability with Mobile Passcodes

When it comes to mobile device passcodes, organizations constantly search for a happy medium between security and usability. In this Ask-an-Expert live interaction, IANS Faculty Justin Wilder details the various options and recommends allowing less complex passwords and Touch ID access, but also adding compensating controls to ensure data stays safe. 

Read More »

August 29, 2018 | Big Data
By Marcus Ranum, IANS Faculty

 AI and ML Demystified

Vendors are all hopping on the artificial intelligence (AI) and machine learning (ML) bandwagon, but how can you cut through the hype and understand how to leverage AI and ML for practical security capabilities? In this report, IANS Faculty Marcus Ranum details exactly where AI and ML stand today, and offers some guidance for determining if/when they can help solve real security problems.

Read More »