News & Blogs

Showing 424-432 of 439
Cloud Computing

VDI vs VPN vs DAAS: Understanding the Differences

April 18, 2023
There are plenty of options available today for providing remote access. Learn about the pros and cons of VDI, VPNs, and Desktop-as-a-Service offerings.
IANS Faculty
Threats & Vulnerabilities

How to Establish an Effective Insider Threat Program

January 28, 2021
Learn about effective strategies for building an insider threat program in your organization with workflow examples and explanations of mistakes to avoid.
IANS Faculty
Threats & Vulnerabilities

Design a Successful Vulnerability Management Program

January 21, 2021
Design a vulnerability management program with this 90-day, step-by-step process guide created to set information security teams up for success.
IANS Faculty
Threats & Vulnerabilities

How to Improve Vunerability Management

January 19, 2021
Learn how to improve your vulnerability management program by acknowledging the current gaps and taking the necessary steps to see changes through.
IANS Faculty
Cloud Computing

A Guide to Cloud Identity Lifecycle Management

January 14, 2021
Find guidance on ways to reflect changes in the central identity directory for cloud applications and infrastructure, the protocols required, and the associated benefits and challenges of each.
IANS Faculty
Cloud Computing

Non-VPN Remote Access Options

January 12, 2021
Take an in-depth look into non-VPN remote access options amidst the adoption of cloud-based desktops, application delivery services and software-defined perimeter (SDP)-like services.
IANS Faculty
Cloud Computing

Cloud Application Security Best Practices

January 5, 2021
Follow these cloud application security best practices from our IANS Faculty to ensure your organization has a strong foundation for defense against threats.
IANS Faculty
Managing Vendors and Third Parties

How to Approach Vendor Management Post SolarWinds Breach

December 22, 2020
Discover issues with vendor management following the SolarWinds breach and learn how to focus on resiliency and risk management moving forward.
IANS Faculty
Threats & Vulnerabilities

How to Detect and Remediate M365 & SSO Impacts of SolarWinds

December 17, 2020
Get a full explanation from our Faculty on the threat of the M365 breach post SolarWinds, and step-by-step guidance for detection and remediation.
IANS Faculty