All Blogs

Showing 280-288 of 382
Identity and Access Management

Centralized IAM Best Practices

December 16, 2021
Organizations making significant investments in cloud services should plan to build a centralized IAM function and focus on five key principles. Here are best practices to follow and pitfalls to avoid when moving to centralized IAM.
IANS Faculty
Management and Leadership

IAM Roadmap Best Practices

December 14, 2021
Learn what a typical IAM roadmap entails and find best practices to ensure your IAM program supports the business efficiently and effectively.
IANS Faculty
Threats & Vulnerabilities

Modern Ransomware Requires More Than Just Good Backups

December 9, 2021
A strong backup solution will minimize the impact of ransomware attacks, but backups alone are not enough protection. Find best practices aimed at building a holistic data protection strategy that will help organizations avoid paying a ransom.
IANS Faculty
Infrastructure

Considerations for a Move from an E3 to E5 License for M365

December 7, 2021
Identify and understand key decision points to consider when evaluating a transition from M365 E3 licenses to E5 licenses for email hygiene, endpoint protection and eDiscovery/compliance.
IANS Faculty
Management and Leadership

Three Security Initiatives to Consider in 2022

December 2, 2021
As the end of the year approaches, security leaders are starting to plan their strategic and tactical roadmaps for the year ahead. Here is a list of three security initiatives to consider in 2022.
IANS Faculty
Security Operations

Key Server and Endpoint Security Metrics to Track

November 30, 2021
The most valuable server and endpoint security metrics for security teams tend to help improve the security program overall. Here is a list of key server and endpoint security metrics to use for reporting.
IANS Faculty
Security Operations

Guidance for Building a Security Data Lake

November 23, 2021
Understand how data lakes differ from SIEMs, and guidance for planning, building, and securing a security data lake.
IANS Faculty
Security Operations

How to Evaluate the Viability of a Data Lake for Security

November 18, 2021
Are data lakes a viable option for your security program? Gain a better understanding of data lakes and learn the advantages and challenges of implementing them for security.
IANS Faculty
Application Development

Top 10 Container Security Tools for the Cloud

November 16, 2021
Find the top commercial and open source container and orchestration tools to consider within a cloud environment, along with recommendations for ensuring your architecture is secure, compliant and well-positioned for scale.
IANS Faculty