News & Blogs
Showing 424-432 of 439
Cloud Computing
VDI vs VPN vs DAAS: Understanding the Differences
April 18, 2023
There are plenty of options available today for providing remote access. Learn about the pros and cons of VDI, VPNs, and Desktop-as-a-Service offerings.
IANS Faculty
Threats & Vulnerabilities
How to Establish an Effective Insider Threat Program
January 28, 2021
Learn about effective strategies for building an insider threat program in your organization with workflow examples and explanations of mistakes to avoid.
IANS Faculty
Threats & Vulnerabilities
Design a Successful Vulnerability Management Program
January 21, 2021
Design a vulnerability management program with this 90-day, step-by-step process guide created to set information security teams up for success.
IANS Faculty
Threats & Vulnerabilities
How to Improve Vunerability Management
January 19, 2021
Learn how to improve your vulnerability management program by acknowledging the current gaps and taking the necessary steps to see changes through.
IANS Faculty
Cloud Computing
A Guide to Cloud Identity Lifecycle Management
January 14, 2021
Find guidance on ways to reflect changes in the central identity directory for cloud applications and infrastructure, the protocols required, and the associated benefits and challenges of each.
IANS Faculty
Cloud Computing
Non-VPN Remote Access Options
January 12, 2021
Take an in-depth look into non-VPN remote access options amidst the adoption of cloud-based desktops, application delivery services and software-defined perimeter (SDP)-like services.
IANS Faculty
Cloud Computing
Cloud Application Security Best Practices
January 5, 2021
Follow these cloud application security best practices from our IANS Faculty to ensure your organization has a strong foundation for defense against threats.
IANS Faculty
Managing Vendors and Third Parties
How to Approach Vendor Management Post SolarWinds Breach
December 22, 2020
Discover issues with vendor management following the SolarWinds breach and learn how to focus on resiliency and risk management moving forward.
IANS Faculty
Threats & Vulnerabilities
How to Detect and Remediate M365 & SSO Impacts of SolarWinds
December 17, 2020
Get a full explanation from our Faculty on the threat of the M365 breach post SolarWinds, and step-by-step guidance for detection and remediation.
IANS Faculty
We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Policy.