Filter By:

Recent Blogs & Podcasts

200 Results for: "Mark Clancy"

 



January 3, 2018 | Insider Threats
By Mark Clancy, IANS Faculty

 Insider Threats: Know What to Watch For

Detecting and stopping insider threats requires a strong balance between people-oriented processes and technology-oriented solutions. In this Ask-an-Expert written response, IANS Faculty Mark Clancy details some common insider threat scenarios and offers tips for detecting them before they cause harm.

Read More »


December 27, 2017 | Security Analytics and Visualization
By Mark Clancy, IANS Faculty

 Anomaly Detection: A Market Landscape

Detecting anomalies across both users and networks requires a strong combination of network, endpoint detection and response (EDR), security and information event management (SIEM) capabilities and more. In this Ask-an-Expert written response, IANS Faculty Mark Clancy provides a rundown of market options, including their pros and cons.

Read More »


November 30, 2017 | Risk Management
By Mark Clancy, IANS Faculty

 GRC Alternatives: Evaluating the Vendor Landscape

Whether they focus on integrated risk management or security analytics and reporting, alternatives to more comprehensive GRC tools abound - but how well do they stack up? In this Ask-an-Expert written response, IANS Faculty Mark Clancy examines the broad vendor landscape and offers some tips for choosing the solution that best fits your needs.

Read More »


July 31, 2017 | Incident Investigations, Handling and Tracking
By IANS Faculty, IANS Faculty

 Poll: Is It Better to Shut Down/Disconnect a Suspected Malware-Infected Device or Leave It Running?

When malware strikes, ensuring employees know and take the right steps immediately can make all the difference. In this report, IANS Faculty Mark Clancy, Dave Kennedy, Aaron Turner and Marcus Ranum weigh in on whether employees' first step should be to shut down the infected machine or contact security. 

Read More »


July 28, 2017 | Regulations & Legislation
By Mark Clancy, IANS Faculty

 Tackle the NYSDFS Cybersecurity Regulations

Many organizations in the banking, insurance and financial services sectors are in the process of complying with the New York State Department of Financial Services' new cybersecurity regulations. In this report, IANS Faculty Mark Clancy offers tips and key strategies for complying with the new requirements, particularly around authentication, audit logging, encryption and training/awareness. 

Read More »


July 10, 2017 | Malware and Advanced Threats
By Mike Saurbaugh, IANS Faculty

 IANS Vulnerability and Breach Update: Q2 2017

A new vulnerability or breach seems to be discovered daily, but which should be taken more seriously and which are overhyped? In this report, IANS Faculty Mike Saurbaugh looks back over the major breaches and vulnerabilities of the past three months, explains them and provides real-world context and perspective.

Read More »


April 26, 2017 | Cloud Access Security Brokers
By Rich Mogull, IANS Faculty

 Navigating an Increasingly Commoditized CASB Marketplace

Over the past few years, there has been a lot of consolidation in the cloud access security broker (CASB) market. In this live Ask-an-Expert interaction, IANS Faculty Rich Mogull offers an assessment of the current CASB marketplace and explains why the recent commoditization in the space means organizations should prioritize ease of integration when choosing a CASB. 

Read More »


February 16, 2017 | Cloud Access Security Brokers
By George Gerchow, IANS Faculty

 Deciphering the Dynamic CASB Marketplace

The cloud access security broker (CASB) market continues to mature. In this report, IANS Faculty George Gerchow provides an update, detailing the relevant vendors, their latest capability sets and the various deployment models available. He also offers some guidance on choosing the right CASB for your needs and cloud maturity level, as well as trends to expect in the future.

Read More »


August 29, 2016 | Embedded Systems and Internet of Things
By Davi Ottenheimer, IANS Faculty

 IoT Security Services: A Business in Search of a Market

In a recent Ask-an-Expert call, a security team for a technical support and after-market warranty vendor asked if there is currently a market for support services aimed at helping consumers and small businesses deal with IoT-related security concerns. In response, I ultimately believe there really isn’t much of a market to sustain such a service right now. People are primarily focused on getting the technology to work; any security concerns they may have are an afterthought at best, and it will take a while for the market to get there.

Read More »