News & Blogs

Showing 1-9 of 76
Threats & Vulnerabilities

Hackers Used Anthropic’s Claude to Target Mexican Water Utility, Researchers Say

May 13, 2026
Hackers Used Anthropic’s Claude to Target Mexican Water Utility, Researchers Say
IANS News
Threats & Vulnerabilities

Critical Logic Flaw in Linux Kernel Enables System Takeover

May 4, 2026
Critical Logic Flaw in Linux Kernel Enables System Takeover
IANS News
CISO

U.S. Cyber Strategy: A Private Sector Call to Action

April 6, 2026
Cybersecurity is now a board-level priority. Discover how the U.S. Cyber Strategy for America impacts executives, AI security, regulation, and private-sector cyber defense.
Lee Kim- IANS Faculty
Lee Kim
Threats & Vulnerabilities

Strengthen Ransomware Resilience with IANS Tabletop Exercises

January 15, 2026
Discover how quarterly tabletop exercises strengthen organizational resilience and cyber preparedness.
AJ King
Threats & Vulnerabilities

Software Supply Chain Threat Modeling Checklist

December 15, 2022
Mitigate supply chain risk by threat modeling third-party software and services as they are deployed into the environment. Save time with help from this actionable checklist that follows the Microsoft Security Development Lifecycle.
IANS
Threats & Vulnerabilities

Insider Data Exfiltration - Threats and New Challenges

June 9, 2022
Gain a solid understanding of the latest insider data exfiltration threats and challenges. Learn best practices outlined in this piece to protect your organization from insider threats.
IANS Faculty
Threats & Vulnerabilities

How to Prevent and Mitigate Social Engineering Attacks

May 31, 2022
Find best practices to prevent social engineering attacks along with mitigation tactics as part of a sound risk mitigation strategy.
IANS Faculty
Threats & Vulnerabilities

Purple Team Exercise Readiness Checklist

April 7, 2022
Find guidelines on key prerequisites to ensure organizations are fully prepared to participate in purple team exercises.
IANS Faculty
Threats & Vulnerabilities

How to Formalize Your Vulnerability Management Program

March 22, 2022
Identify the key areas to consider when formalizing a vulnerability management program. Find guidance on standards, policies and procedures; vulnerability lifecycle management; operating system patching; and communication with stakeholders to ensure your security team gets it right.
IANS Faculty