Filter By:

Type

Topic

Recent Blogs & Podcasts

95 Results for: "Aaron Shi"

 



April 5, 2018 | Encryption, Digital Signatures, Certificates, Tokenization
By Aaron Shi, IANS Director of Web Development & Security

 Ensure Your User IDs Are Encrypted

In the wake of the Equifax breach and other high-profile incidents, organizations are enforcing encryption across all PII and passwords, but what about user IDs? In this Ask-an-Expert written response, IANS Director of Web Development and Security Aaron Shi explains why user IDs are often left in the clear and offers a simple way to bring them into the encryption fold.

Read More »


May 12, 2015 | Vulnerability Assessment and Management
By Daniel Maloof, IANS Managing Editor

 Aaron Turner to Deliver a Feature Presentation at ISSA-LA Information Security Summit

When you think about the marvel that is the international cellular network, it is truly amazing to realize that the ability to communicate with one another is very nearly universal. But, as with any complex network, there are significant opportunities for attackers to exploit vulnerabilities in components of the system.

Read More »


April 19, 2018 | Account Provisioning
By Aaron Turner, IANS Faculty

 Cloud Provisioning: Know the Issues

The good news for cloud identity management? Authentication standards are solid. The bad news? Authorization standards are nowhere near as mature. In this Ask-an-Expert written response, IANS Faculty Aaron Turner details the many challenges in cloud provisioning and recommends focusing on making role-based access control (RBAC) as efficient as possible.

Read More »


April 12, 2018 | Security Policies and Strategy
By Aaron Turner, IANS Faculty

 Set an Optimal Social Media Usage Policy

Like all things in infosec, social media usage policies must strive to balance security with business benefits. In this Ask-an-Expert written response, IANS Faculty Aaron Turner explains the pros and cons of strict vs. permissive social media policies and suggests the best path forward is to balance unfettered social media engagement with smart investments in SSL decryption and other monitoring solutions.

Read More »


March 28, 2018 | Authentication
By Aaron Turner, IANS Faculty

 Outsourced Authentication: When It Works – and When It Doesn’t

In this always-on cloud/mobile world, many organizations are outsourcing their application authentication to the likes of Google, Facebook and LinkedIn. In this report, IANS Faculty Aaron Turner explains when handing your authentication tasks to a third-party makes sense – and when it doesn’t. He also details the key decision factors to consider before making the move. 

Read More »


March 22, 2018 | Mobile Client Devices
By Aaron Turner, IANS Faculty

 Android vs. iOS: Which Is More Secure?

Deciding whether Android or iOS devices are more secure for a corporate environment is difficult because the underlying platforms are in constant flux. In this Ask-an-Expert written response, IANS Faculty Aaron Turner says both can be secure if their OS is kept up to date, but Android 7 has a slight advantage – at least at this point in time.

Read More »


February 13, 2018 | Security Analytics and Visualization
By John Strand, IANS Faculty,
     Aaron Turner, IANS Faculty

 Cut Through the AI/ML Hype

Vendors across the board are touting artificial intelligence and machine learning as the next big thing in security, but how practical is it for today's enterprises? In this Ask-an-Expert live interaction, IANS Faculty John Strand and Aaron Turner discuss the current state of the technology and offer practical ways to assess vendor offerings.

Read More »


February 7, 2018 | Business Productivity
By Aaron Turner, IANS Faculty

 Choose a Secure Executive Portal

Executive portals and board books must be both easy enough for top execs to use and secure enough to keep board-level information safe. In this Ask-an-Expert written response, IANS Faulty Aaron Turner considers the pros and cons of three offerings: Boardvantage, Diligent and BoardPad.

Read More »