News & Blogs
Showing 55-63 of 430
Threats & Vulnerabilities
Ransomware: Prevention and Response Tactics
March 8, 2022
Find guidance for security teams on how to try and prevent a ransomware attack along with tactics on how to respond should your organization fall victim to an attack.
IANS Faculty
Governance, Risk Management & Compliance
How to Establish Data Ownership and Governance Roles
January 18, 2022
Learn how to put a workable data management and governance process in place.
IANS Faculty
Identity and Access Management
Password-less Authentication: A Step-By-Step Guide
January 11, 2022
Find a step-by-step guide for implementing password-less authentication, including best practices to follow and pitfalls to avoid.
IANS Faculty
Management and Leadership
How to Coordinate CTI and Vulnerability Management
December 30, 2021
Cyber threat intelligence (CTI) provides context to vulnerability management by focusing security resources and enabling them to take a risk-based approach to remediation. This piece discusses how CTI functions can work closely with vulnerability management to keep threat intelligence data effective and actionable.
IANS Faculty
Identity and Access Management
Centralized IAM Best Practices
December 16, 2021
Organizations making significant investments in cloud services should plan to build a centralized IAM function and focus on five key principles. Here are best practices to follow and pitfalls to avoid when moving to centralized IAM.
IANS Faculty
Application Development
Top 10 Container Security Tools for the Cloud
November 16, 2021
Find the top commercial and open source container and orchestration tools to consider within a cloud environment, along with recommendations for ensuring your architecture is secure, compliant and well-positioned for scale.
IANS Faculty
Governance, Risk Management & Compliance
How to Transition from NIST SP 800-53 Rev. 4 to Rev. 5
October 21, 2021
Find a structured plan to help your organization successfully transition from NIST SP 800-53 Rev. 4 to Rev. 5 controls within your security and privacy management programs.
IANS Faculty
Governance, Risk Management & Compliance
Continuous Compliance Best Practices
October 19, 2021
Continuous compliance requires continuous monitoring and validation of controls in the environment, as well as integration with governance, risk management and compliance tools and platforms. Understand the processes, tools, stakeholders and focus required for a best practice continuous compliance program.
IANS Faculty
Enterprise Software
5 Ways to Configure M365 to Improve Security
October 12, 2021
Uncertain how to secure your M365 environment? Our Faculty identify and explain the five primary areas of M365 that will provide the best security return-on-investment with the least user experience impacts.
IANS Faculty
We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Policy.