We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

Insights Portal

\ Ask-an-Expert 



June 21, 2018 | Vulnerability Assessment and Management
By Kevin Beaver, IANS Faculty

 Best Practices in Database Vulnerability Management

Beyond data encryption and access monitoring, how can organizations ensure the data within their SQL Server, DB2 and Oracle databases are secure? In this Ask-an-Expert written response, IANS Faculty Kevin Beaver recommends performing authenticated vulnerability scans in addition to implementing in-depth penetration testing, monitoring and other controls.

Read More »


June 19, 2018 | Encryption, Digital Signatures, Certificates, Tokenization
By Aaron Turner, IANS Faculty

 Three Success Factors for SSH Key Management

Despite the fact that most enterprises use hundreds of thousands of SSH keys on a regular basis, few have the right pieces in place to manage them effectively. In this Ask-an-Expert written response, IANS Faculty Aaron Turner says successful SSH key management depends on three factors: strong configuration management, mature service management and effective policy management.

Read More »


June 18, 2018 | Password Management
By James Tarala, IANS Faculty

 Best Practices in Password Protection

With the recent spate of high-profile data breaches, many organizations are re-evaluating their password protection policies. In this Ask-an-Expert live interaction, IANS Faculty James Tarala offers a simple recipe for password protection, but says forward-looking organizations should also be preparing now for an MFA future.

Read More »


June 12, 2018 | Metrics and Reporting
By Marcus Ranum, IANS Faculty

 Create Metrics to Show Security’s Business ROI

Dollar-based metrics may get executives' attention, but are they the right tools to use to promote information security across an organization? In this Ask-an-Expert written response, IANS Faculty Marcus Ranum steps through the process of creating actionable security metrics and suggests focusing on staff time vs. dollars when reporting to top management.

Read More »


June 11, 2018 | Cloud Application and Data Controls
By Michael Pinch, IANS Faculty

 Best Practices for AWS Access Management

When moving to a cloud platform like Amazon Web Services (AWS), functions like identity and access management become even more critical. In this Ask-an-Expert written response, IANS Faculty Michael Pinch suggests easing the process by leveraging SAML 2.0 to authenticate corporate Active Directory (AD) accounts to the cloud. 

Read More »


June 5, 2018 | Network Access Controls (NAC)
By Jennifer Minella, IANS Faculty

 Choose the Right NAC Solution

The success of a NAC solution depends heavily on an organization's specific goals and network environment, but certain features can make or break an implementation. In this Ask-an-Expert written response, IANS Faculty Jennifer Minella compares products from four vendors - Aruba, Bradford, Cisco and ForeScout - across four key feature areas.

Read More »