We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:



Recent Blogs & Podcasts

Insights Portal

\ Faculty Reports


October 22, 2018 | Cloud Access Security Brokers
By Dave Shackleford, IANS Faculty

 8 Key CASB Decision Factors

Today's CASBs help improve everything in the cloud, from visibility and data security to threat protection and compliance. In this report, IANS Faculty Dave Shackleford explains how CASBs work and details the eight key decision factors organizations should assess before choosing one for their environment.

Read More »

October 5, 2018 | Malware and Advanced Threats
By Mike Saurbaugh, IANS Faculty

 IANS Vulnerability and Breach Update: Q3 2018

Vulnerabilities and breaches are mainstream news regularly. With a new vulnerability seemingly discovered daily, which should be taken more seriously (i.e., patch now!) and which are overhyped? In this quarterly research report, IANS Faculty Mike Saurbaugh updates clients on the top vulnerabilities and breaches from the past quarter and provides some real-world context and perspective.

Read More »

October 4, 2018 | Cloud Application and Data Controls
By Dave Shackleford, IANS Faculty

 IANS Cloud Security Update: Q3 2018

As organizations continue to move services and computing assets into cloud service provider environments, the need for adequate security controls grows as well. In this quarterly research report, IANS Lead Faculty Dave Shackleford updates IANS’ clients on the new developments occurring in the cloud security arena.

Read More »

September 12, 2018 | Vendor and Partner Management
By Josh More, IANS Faculty

 Elevate Your Third-Party Risk Management Program

Third parties allow businesses to be nimble, increase profitability and gain a competitive advantage – but not without risk. In this report, IANS Faculty Josh More explains how to elevate your third-party risk program and move beyond basic questionnaires to a rigorous program to protect your business and your brand.

Read More »

September 5, 2018 | Penetration Testing and Red Teaming
By Joff Thyer, IANS Faculty

 Harness the Power of Purple Teaming

The collaborative power of purple teaming is tough to beat, but what's the best way to get started? In this report, IANS Faculty Joff Thyer details the requisite roles, responsibilities, tools and technologies for conducting effective purple team exercises.

Read More »

August 29, 2018 | Big Data
By Marcus Ranum, IANS Faculty

 AI and ML Demystified

Vendors are all hopping on the artificial intelligence (AI) and machine learning (ML) bandwagon, but how can you cut through the hype and understand how to leverage AI and ML for practical security capabilities? In this report, IANS Faculty Marcus Ranum details exactly where AI and ML stand today, and offers some guidance for determining if/when they can help solve real security problems.

Read More »

August 15, 2018 | DevOps Organization and Strategy
By Jason Gillam, IANS Faculty

 Shift Left: Drive the Sec into DevSecOps

In the fast-moving world of Agile and DevOps environments, security needs to become an integral part of the continuous integration/continuous delivery (CI/CD) process. In this report, IANS Faculty Jason Gillam examines the tactics and strategies of successful DevSecOps organizations and discusses ways to foster the right organizational mindset to get everyone on the same page.

Read More »

August 8, 2018 | Mobile Client Devices
By Aaron Turner, IANS Faculty

 Create a Practical Mobile Security Roadmap

Mobile devices in the enterprise are simply a given today. So why are they so difficult to secure? In this report, IANS Faculty Aaron Turner provides some key insights into the true risk of top mobile platforms like Apple iOS and Google Android, and offers practical strategies for properly managing and securing them.

Read More »

August 1, 2018 | AppDev Frameworks
By Josh More, IANS Faculty

 Containerization: Know the Pros and Cons

As more DevOps organizations shift from virtualization technologies to container platforms like Docker, they quickly find configuring and locking down these container environments is no easy task. In this report, IANS Faculty Josh More details the advantages and risks of containerization tools, and offers tips for securing them properly.

Read More »