News & Blogs
Showing 325-333 of 452
Management and Leadership
Benchmark Report Preview: Salaries for Top Infosec Leaders
December 13, 2022
Access key data sets from the 2022 edition of IANS and Artico Search’s Security Organization and Compensation Benchmark Report. Gain valuable insights on org design and compensation to hire and retain top security talent.
IANS Research
Enterprise Software
M365 Hardening: Protecting Against Sophisticated Attacks
October 13, 2022
Learn how enterprises can properly harden their M365 Identities and Exchange Online environments by prioritizing activities that can help protect against sophisticated attacks.
IANS Faculty
Management and Leadership
Build Executive Buy-in for Zero Trust
August 16, 2022
Understand the challenges of implementing zero trust and learn how to make a case and build executive buy-in for your team’s zero trust initiative.
IANS Faculty
Threats & Vulnerabilities
Guidance for Launching a Threat Hunting Program
April 28, 2022
Learn how to assess your security program’s readiness for threat hunting and also find guidance on how to launch a successful threat hunting program.
IANS Faculty
Threats & Vulnerabilities
What is a Purple Team? Strategies for Effective Collaboration
April 26, 2022
A purple team combines elements of red and blue teams to create a collaborative security strategy. Explore ways to effectively create a purple team.
IANS Faculty
Threats & Vulnerabilities
Data Exfiltration: Threats, Challenges and Prevention
April 21, 2022
Gain a solid understanding of data exfiltration, what causes it, and find best practices to protect your organization from outside and insider threats.
IANS Faculty
Threats & Vulnerabilities
Understand the Roles of Red, Blue and Purple Teams
April 19, 2022
Do you know the differences between red, blue and purple teams? Understand the responsibilities of red, blue and purple teams and their roles in strengthening security posture.
IANS Faculty
Threats & Vulnerabilities
How to Build a Proactive Threat Hunting Strategy
April 14, 2022
Understand how building an efficient proactive threat hunting strategy can lower the risk of compromised security, data breaches and other serious cyberattacks.
IANS Faculty
Threats & Vulnerabilities
How to Harness the Power of Purple Teaming
April 12, 2022
Understand the prerequisites, roles and responsibilities, as well as best practices for conducting effective purple team exercises.
IANS Faculty
We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Policy.