News & Blogs

Showing 55-63 of 430
Threats & Vulnerabilities

Ransomware: Prevention and Response Tactics

March 8, 2022
Find guidance for security teams on how to try and prevent a ransomware attack along with tactics on how to respond should your organization fall victim to an attack.
IANS Faculty
Governance, Risk Management & Compliance

How to Establish Data Ownership and Governance Roles

January 18, 2022
Learn how to put a workable data management and governance process in place.
IANS Faculty
Identity and Access Management

Password-less Authentication: A Step-By-Step Guide

January 11, 2022
Find a step-by-step guide for implementing password-less authentication, including best practices to follow and pitfalls to avoid.
IANS Faculty
Management and Leadership

How to Coordinate CTI and Vulnerability Management

December 30, 2021
Cyber threat intelligence (CTI) provides context to vulnerability management by focusing security resources and enabling them to take a risk-based approach to remediation. This piece discusses how CTI functions can work closely with vulnerability management to keep threat intelligence data effective and actionable.
IANS Faculty
Identity and Access Management

Centralized IAM Best Practices

December 16, 2021
Organizations making significant investments in cloud services should plan to build a centralized IAM function and focus on five key principles. Here are best practices to follow and pitfalls to avoid when moving to centralized IAM.
IANS Faculty
Application Development

Top 10 Container Security Tools for the Cloud

November 16, 2021
Find the top commercial and open source container and orchestration tools to consider within a cloud environment, along with recommendations for ensuring your architecture is secure, compliant and well-positioned for scale.
IANS Faculty
Governance, Risk Management & Compliance

How to Transition from NIST SP 800-53 Rev. 4 to Rev. 5

October 21, 2021
Find a structured plan to help your organization successfully transition from NIST SP 800-53 Rev. 4 to Rev. 5 controls within your security and privacy management programs.
IANS Faculty
Governance, Risk Management & Compliance

Continuous Compliance Best Practices

October 19, 2021
Continuous compliance requires continuous monitoring and validation of controls in the environment, as well as integration with governance, risk management and compliance tools and platforms. Understand the processes, tools, stakeholders and focus required for a best practice continuous compliance program.
IANS Faculty
Enterprise Software

5 Ways to Configure M365 to Improve Security

October 12, 2021
Uncertain how to secure your M365 environment? Our Faculty identify and explain the five primary areas of M365 that will provide the best security return-on-investment with the least user experience impacts.
IANS Faculty