Filter By:



Recent Blogs & Podcasts

Insights Portal


March 8, 2018 | Infosec Outlook

 Public Companies: Cybersecurity a Top Concern in 2018

Corporate directors of public companies rank cybersecurity threats as one of their top four concerns heading into 2018. Other security-related concerns include technology disruptions, increased regulatory burden and global security threats.

Read More »

March 8, 2018 | Metrics and Reporting
By Josh More, IANS Faculty

 Use Metrics to Communicate Risk Management’s Value

A successful metrics program helps tell security's story in a way that fosters business engagement and support, but what's the best way to get there? In this Ask-an-Expert written response, IANS Faculty Josh More discusses the difference between operational and strategic metrics, and offers tips for getting started using FAIR.

Read More »

March 7, 2018 | Key Technologies

 Multi-Factor Authentication Market to Reach $20.4 Billion by 2025

The increasing number of cyber attacks around the world has pushed organizations to ramp up their efforts around identity and access management. For instance, the global multifactor authentication market is expected to grow at a compound annual growth rate of (CAGR) of more than 17 percent between 2017 and 2025.

Read More »

March 7, 2018 | Cloud Network and Host Controls
By Dave Shackleford, IANS Faculty

 Cloud Security Controls: A Question of Trust

When is it ok to use a cloud provider’s security controls – and when isn’t it? In this report, IANS Faculty Dave Shackleford details the latest security offerings from the likes of Amazon, Azure and Google, explains what works well and what’s still missing, and offers some good rules of thumb for deciding when to trust the security controls offered by your cloud provider.

Read More »

March 7, 2018 | Authentication

 Multi-Factor Authentication (MFA) Checklist

It's clear multi-factor authentication (MFA) offers a far more robust solution than passwords alone for protecting critical systems and data. In this checklist, IANS details the practical steps for choosing and implementing an enterprise-class MFA solution that helps meet regulatory requirements, facilitate realistic business operations and actually stop attacks.

Read More »

March 6, 2018 | Budgeting, Sizing

 Top 2018 Security Investment Priorities

Guarding sensitive data (16%), endpoint protection (15%), SIEM/analytics (14%) and in-house expertise (12%) are the top security investment priorities for 2018, according to a global survey of organizations.

Read More »

March 6, 2018 | Privileged Access Management
By Andrew Carroll, IANS Faculty

 A PAM Tool Comparison (Updated)

Managing privileged users is becoming increasingly critical, but choosing the right enterprise-grade PAM tool is not straightforward. In this update to a previous Ask-an-Expert written response, IANS Faculty Andrew Carroll underscores the importance of matching the tool to the use case and adds Centrify to his comparison of CyberArk and Osirium across key use case criteria.

Read More »

March 5, 2018 | Threats & Incidents

 Overview of Top Big Data Security Concerns in 2018

The top Big Data security issue is that sensitive data can be anywhere – and therefore everywhere – a concern that’s expressed by 34% of global and U.S. respondents. One related concern is that Big Data-generated reports could contain sensitive data (33% global and U.S.), while concerns over privacy regulations at 30% global round out the list of top issues.

Read More »

March 5, 2018 | IT Service Management
By Josh More, IANS Faculty

 Ensure Critical Elements Are Included in GRC Documents, Workflows

When starting a GRC program from scratch, it can be difficult to foresee which ingredients are critical to success and which aren't. In this Ask-an-Expert written response, IANS Faculty Josh More details the critical elements to include and pitfalls to avoid, while urging a high-level focus on workflows, culture and stakeholder alignment.

Read More »