Filter By:



Recent Blogs & Podcasts

Insights Portal


March 22, 2018 | Cloud Network and Host Controls
By Dave Shackleford, IANS Faculty

 IANS Decision-Maker: IaaS Security Controls

For security teams, choosing security controls in the cloud can be daunting at best, and incredibly frustrating at worst. This tool is designed to help security teams make decisions on which solutions and controls make the most sense when moving workloads into IaaS environments.

Read More »

March 22, 2018 | Mobile Client Devices
By Aaron Turner, IANS Faculty

 Android vs. iOS: Which Is More Secure?

Deciding whether Android or iOS devices are more secure for a corporate environment is difficult because the underlying platforms are in constant flux. In this Ask-an-Expert written response, IANS Faculty Aaron Turner says both can be secure if their OS is kept up to date, but Android 7 has a slight advantage – at least at this point in time.

Read More »

March 21, 2018 | Authentication
By James Tarala, IANS Faculty

 An Enterprise Guide to Practical MFA

Multifactor authentication (MFA) provides a more robust solution than simple passwords, and while the latest offerings are more user-friendly and easier to deploy than ever before, selecting the right implementation and feature set is no easy feat. In this webinar, IANS Faculty James Tarala details the practical steps for choosing and implementing an enterprise-class MFA solution that helps meet regulatory requirements, facilitate realistic business operations and actually stop attacks.

Read More »

March 21, 2018 | Incident Response Planning
By Kevin Beaver, IANS Faculty

 Lay the Groundwork for IR in the Cloud

Incident response is never easy, but responding quickly and effectively to an incident when key evidence is housed and managed by a cloud vendor can be even more difficult. In this report, IANS Faculty Kevin Beaver steps you through the process of putting the right pieces in place to ensure your cloud incident response is effective and efficient.

Read More »

March 20, 2018 | Managed Security Services
By Dave Shackleford, IANS Faculty

 Consider the Top MSSPs for Your SOC

How can you be sure the MSSP you choose for your SOC will be the right fit for your business and security needs? In this Ask-an-Expert written response, IANS Faculty Dave Shackleford details the main decision factors and lists the top MSSPs to consider, along with their strengths and weaknesses.

Read More »

March 13, 2018 | Account Provisioning
By Andrew Carroll, IANS Faculty

 Ease IDAM by Automating Three Key Processes

Automating identity and access management (IDAM) processes can make a security organization more efficient and effective, but where to start? In this Ask-an-Expert written response, IANS Faculty Andrew Carroll suggests automating three key functions: network provisioning/de-provisioning, entitlement review and application role provisioning.

Read More »

March 12, 2018 | Risk Management
By Rich Guida, IANS Faculty

 Get Business Execs to Share Their Infosec Risk Concerns

Understanding what risks keep business execs up at night is the foundation of good information security, but how can you elicit this info and ensure execs remain engaged? In this Ask-an-Expert written response, IANS Faculty Rich Guida details a process that not only draws out executives' primary concerns but maps them to key infosec risks to gain better consensus - and funding.

Read More »