All Blogs

Showing 10-18 of 67
Threats & Vulnerabilities

Creating a Threat Model in 4 Efficient Steps

January 5, 2023
Discover our steps and tips for analyzing your threat landscape and creating a threat model that's specific to your industry using third-party research assets.
IANS Faculty
Threats & Vulnerabilities

Threat Model Business Alignment Checklist

January 3, 2023
Learn how to build a threat model specific to your organization. Use this actionable checklist as a guide to collaborate and align business input.
IANS Faculty
Threats & Vulnerabilities

Software Supply Chain Threat Modeling Checklist

December 15, 2022
Mitigate supply chain risk by threat modeling third-party software and services as they are deployed into the environment. Save time with help from this actionable checklist that follows the Microsoft Security Development Lifecycle.
IANS Faculty
Threats & Vulnerabilities

Checklist for Detecting Ransomware Precursors

November 21, 2022
Detect the precursors of a typical ransomware deployment with help from this actionable, time-saving checklist.
IANS Faculty
Threats & Vulnerabilities

The Most Common Ransomware Attacks & How to Prepare for Them

November 17, 2022
Ransomware attacks are becoming more frequent. Explore the most common ransomware attacks, along with ways to prevent and recover from them.
IANS Faculty
Threats & Vulnerabilities

Penetration Test Preparation Checklist

November 10, 2022
Effective pen testing begins with defining test goals and setting proper expectations. Save time scoping and planning pen tests using this actionable checklist.
IANS Faculty
Threats & Vulnerabilities

How to Prevent and Detect Packet Sniffing Attacks

August 11, 2022
Gain a solid understanding of packet sniffing attack techniques and find best practices to detect and prevent your organization from falling victim to packet sniffing attacks.
IANS Research
Threats & Vulnerabilities

Best Practices to Detect & Prevent BEC Attacks

July 26, 2022
Learn how to detect and prevent BEC attacks by incorporating awareness and effective mitigation strategies into a comprehensive anti-phishing program.
IANS Faculty
Threats & Vulnerabilities

Detect and Prevent Clone Phishing Attacks

July 21, 2022
Understand how clone phishing attacks work along with best practices to detect attacks and build a tailored, comprehensive anti-phishing strategy.
IANS Faculty