News & Blogs
Showing 433-441 of 452
Cloud Computing
VDI vs VPN vs DAAS: Understanding the Differences
April 18, 2023
There are plenty of options available today for providing remote access. Learn about the pros and cons of VDI, VPNs, and Desktop-as-a-Service offerings.
IANS Faculty
Threats & Vulnerabilities
What Security Teams Want to Know About Responding to Ransomware Attacks
September 30, 2021
Get first-hand insights into what other security teams want to know about how to respond to ransomware attacks based on the questions they ask our Faculty.
IANS Research
Threats & Vulnerabilities
Design a Successful Vulnerability Management Program
January 21, 2021
Design a vulnerability management program with this 90-day, step-by-step process guide created to set information security teams up for success.
IANS Faculty
Cloud Computing
A Guide to Cloud Identity Lifecycle Management
January 14, 2021
Find guidance on ways to reflect changes in the central identity directory for cloud applications and infrastructure, the protocols required, and the associated benefits and challenges of each.
IANS Faculty
Cloud Computing
Non-VPN Remote Access Options
January 12, 2021
Take an in-depth look into non-VPN remote access options amidst the adoption of cloud-based desktops, application delivery services and software-defined perimeter (SDP)-like services.
IANS Faculty
Cloud Computing
Cloud Application Security Best Practices
January 5, 2021
Follow these cloud application security best practices from our IANS Faculty to ensure your organization has a strong foundation for defense against threats.
IANS Faculty
Managing Vendors and Third Parties
How to Approach Vendor Management Post SolarWinds Breach
December 22, 2020
Discover issues with vendor management following the SolarWinds breach and learn how to focus on resiliency and risk management moving forward.
IANS Faculty
Threats & Vulnerabilities
How to Detect and Remediate M365 & SSO Impacts of SolarWinds
December 17, 2020
Get a full explanation from our Faculty on the threat of the M365 breach post SolarWinds, and step-by-step guidance for detection and remediation.
IANS Faculty
Threats & Vulnerabilities
How to Respond to the SolarWinds Breach
December 3, 2020
Find best practices on how to respond to the breached SolarWinds Orion servers as well as advice on how to defend against supply chain attacks like it.
IANS Faculty
We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Policy.