All Blogs

Showing 217-225 of 372
Governance, Risk Management & Compliance

Key Features to Look for in a GRC Tool

May 10, 2022
Considering implementing a GRC tool? Learn the main features to look for when evaluating a GRC tool.
IANS Faculty
Threats & Vulnerabilities

How to Deal with Individuals Who Repeatedly Fail Phishing Simulations

May 5, 2022
Does your organization have a group of individuals who repeatedly fail phishing simulations? Gain an understanding of the issues behind repeat responders to phishing simulations and the steps to address them.
IANS Faculty
Threats & Vulnerabilities

How to Advance Your Phishing Program to Address Ransomware

May 3, 2022
With phishing being a frequent attack vector leading to ransomware, it’s important to have an extensive program in place to address the threat of ransomware. Learn how your team can effectively defend against both phishing and ransomware.
IANS Faculty
Threats & Vulnerabilities

Guidance for Launching a Threat Hunting Program

April 28, 2022
Learn how to assess your security program’s readiness for threat hunting and also find guidance on how to launch a successful threat hunting program.
IANS Faculty
Threats & Vulnerabilities

What is a Purple Team? Strategies for Effective Collaboration

April 26, 2022
A purple team combines elements of red and blue teams to create a collaborative security strategy. Explore ways to effectively create a purple team.
IANS Faculty
Threats & Vulnerabilities

Data Exfiltration: Threats, Challenges and Prevention

April 21, 2022
Gain a solid understanding of data exfiltration, what causes it, and find best practices to protect your organization from outside and insider threats.
IANS Faculty
Threats & Vulnerabilities

Understand the Roles of Red, Blue and Purple Teams

April 19, 2022
Do you know the differences between red, blue and purple teams? Understand the responsibilities of red, blue and purple teams and their roles in strengthening security posture.
IANS Faculty
Threats & Vulnerabilities

How to Build a Proactive Threat Hunting Strategy

April 14, 2022
Understand how building an efficient proactive threat hunting strategy can lower the risk of compromised security, data breaches and other serious cyberattacks.
IANS Faculty
Threats & Vulnerabilities

How to Harness the Power of Purple Teaming

April 12, 2022
Understand the prerequisites, roles and responsibilities, as well as best practices for conducting effective purple team exercises.
IANS Faculty