Insights Portal

The IANS Insights Portal contains thousands of research articles, Ask-An-Expert responses, Tools & Templates, Executive Communications materials, Content Aggregator updates and IANS event takeaways. Here you will find a collection of anonymized case studies and real-world examples containing tangible, actionable advice to help you address your organization's challenges.

Interested in our content?

Provide us with your information and an IANS team member will reach out with more information on gaining access.

* Required Fields

Are you an existing client?

If you already have credentials, sign in below.

Still want to know more about IANS?

Learn more about what we have to offer by exploring our website and enjoying some of our complimentary sample content.

Selected Filters:



Filter Options: 
  • Product: The type of product the content is served in. (i.e. Ask-An-Expert, Faculty Report, Content Aggregator, etc.)
    • Content Aggregator Compilations: Collections of singular Content Aggregator slides on specific InfoSec topics
    • Content Aggregator Narratives: Collections of singular Content Aggregator slides on specific InfoSec topics that include a viewpoint or “IANS Perspective"
  • Topic: The general topic that the content falls under. (i.e. Cloud Computing, Infrastructure, Vendor Management, etc.)
  • Author: The creator of a piece of content.
Ask-An-Expert icon

Understand How the DDoS Threat Is Evolving

Volumetric distributed denial-of-service (DDoS) attacks continue to dominate, but application-level and amplification attacks are on the rise. In this written Ask-an-Expert response, IANS Faculty Dave Shackleford details the latest DDoS trends and explains how the threat is set to evolve in the future. 

Ask-An-Expert icon

Smart Kitchens: Weigh the Risks and Rewards

As with other IoT deployments, securing smart industrial kitchens requires strong upfront planning and device expertise. In this Ask-an-Expert written response, IANS Faculty Chris Poulin outlines some common smart kitchen use cases and threats, and details current best practice security strategies.

Ask-An-Expert icon

Poll: Proofpoint vs. Mimecast for Email Filtering

Which is better for email filtering, Proofpoint or Mimecast? In this Viewpoints report, IANS Faculty Josh More and Dave Kennedy say both are good options but Proofpoint wins out in certain areas, such as malware inspection, intel harvesting and event metadata correlation.

Ask-An-Expert icon

Change Management Roles: IT vs. Security

Who's in charge of the change management process, IT operations or security? In this Ask-an-Expert written response, IANS Faculty Dave Shackleford says IT is the traditional owner, and even in DevOps, security takes on primarily an advisory role.

Ask-An-Expert icon

Supply Chain Security: Know Where to Focus

What are the basics of supply chain security? In this Ask-an-Expert written response, IANS Faculty Aaron Turner details the importance of strong contract language as well as understanding the threat landscape and prioritizing risk assessments.

We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.