We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:



Recent Podcasts


\ Blog


October 22, 2017 | Data Breaches
By Ken Van Wyk, IANS Faculty

 Van Wyk: Take Steps to Protect Yourself as a Consumer

With all the digital threats we face on a daily basis, it's a miracle we haven't all been hacked. To ensure the odds are in your favor, there are some informed and well-planned steps you can take to protect yourself as a consumer, particularly as the holiday shopping season approaches. 

Read More »

October 15, 2017 | Mobile Access and Device Management
By Kevin Beaver, IANS Faculty

 Beaver: Learning the Right Lessons from ExpensiveWall Android Malware

If you're in charge of information security, you may not be able to control every user and every device in your environment, but you can shore up the gaps that do exist right now. If a security incident still surfaces, at least you’ll know in good conscience that you’ve done what needed to be done in order to minimize its impact.

Read More »

October 2, 2017 | Incident Response Planning
By Ken Van Wyk, IANS Faculty

 Van Wyk: Doing Your IR Planning the Right Way

In light of the Equifax breach, organizations need to re-examine their incident response planning to ensure similar crises are handled effectively. Being proactive, communicating transparently and prioritizing customers are three important pieces of the IR puzzle,.

Read More »

September 18, 2017 | Embedded Systems and Internet of Things
By Chris Poulin, IANS Faculty

 Poulin: The Economics of IoT Fear and Uncertainty

Information- (and now device-) security is an underappreciated field. It’s anti-climactic and difficult to justify the cost of building security in, bolting security on and implementing security controls for the operating environment. But it's up to us in the community to become early adopters and work with the manufacturers to make products as secure as possible for the general public. 

Read More »

August 14, 2017 | AppDev Frameworks
By Adam Shostack, IANS Faculty

 Shostack: Learning From npm's Rough Few Months

The node package manager (npm) is having a bad few months. Organizations need to look at their controls for identification, protection and detection around package management, and if they make a package manager, threat model the heck out of it. 

Read More »

August 8, 2017 | Embedded Systems and Internet of Things
By Chris Poulin, IANS Faculty

 Poulin: What I Hacked this Summer in Vegas

Another July has come and gone, leaving the security community with a collective information hangover from Black Hat, DEF CON and BSidesLV. Hardware exploitation, IoT, machine-learning and blockchain emerged as some of the major themes from the conferences this year. 

Read More »