Filter By:

Recent Blogs & Podcasts

Insights

\ Ask-an-Expert 



November 21, 2017 | Mobile Client Devices
By Aaron Turner, IANS Faculty

 Best Practices in Drone Security

Drones offer a cost-effective way to perform tasks like remote monitoring and equipment inspections, but how secure are they? In this Ask-an-Expert live interaction, IANS Faculty Aaron Turner provides an overview of the market and offers tips for ensuring drones don't adversely impact your security posture.

Read More »


November 20, 2017 | Security Awareness, Phishing, Social Engineering
By Dave Shackleford, IANS Faculty

 Defend Your Internal Phishing Campaign to Upper Management

Security teams know internal phishing programs are important, but how can they prove that to others in the organization? In this Ask-an-Expert written response, IANS Faculty Dave Shackleford explains how internal phishing campaigns help validate other security controls and offers multiple stats to prove their benefits, including the fact that simulated phishing attacks yield an average ROI of 37 percent.

Read More »


November 14, 2017 | Authentication
By James Tarala, IANS Faculty

 Prep Now for an MFA/PAM Future

Deploying multi-factor authentication and privileged access management to manage server admin access, elevated privileges and remote access is a good first step, but organizations should be planning now for a completely password-less future. In this Ask-an-Expert live interaction, IANS Faculty James Tarala offers a brief history of MFA and PAM, as well as tips for eventually implementing strong authentication for everyone.

Read More »


November 9, 2017 | Security Awareness, Phishing, Social Engineering
By Mike Saurbaugh, IANS Faculty

 Help Consumers Avoid Holiday Shopping Scams

The holidays bring an uptick in both online shopping and holiday-oriented cyber crime. In this Ask-an-Expert written response, IANS Faculty Mike Saurbaugh details the most common shopping scams and offers consumers tips for avoiding them and keeping their personal data safe throughout the season.

Read More »


November 6, 2017 | Threat Intelligence and Modeling
By Paul Asadoorian, IANS Faculty

 Get Your Arms Around Threat Intelligence

Collecting and analyzing data from a variety of threat intelligence feeds and sources can get overwhelming fast. In this Ask-an-Expert written response, IANS Faculty Paul Asadoorian explains the key threat feed data types, ingestion methods and integrations, and suggests some resources that help ease the process. 

Read More »


November 2, 2017 | Security Operations Centers (SOCs)
By Dave Shackleford, IANS Faculty

 SOC Year 1: Set Realistic Expectations

Most organizations struggle to understand what a mature security operations center (SOC) should look like, let alone a fairly new one. In this Ask-an-Expert written response, IANS Faculty Dave Shackleford details some key metrics to track and some realistic expectations to set for the SOC's first year.

Read More »


October 31, 2017 | Application Development and Testing
By Jason Gillam, IANS Faculty

 When to Trust Docker Images

Docker image security comes down to finding the right balance between trust and risk. In this Ask-an-Expert written response, IANS Faculty Jason Gillam explains why some Docker images (such as those in the official Docker repository) are more trustworthy than others.  

Read More »