Each downloadable piece featured below is a fully-detailed, actionable resource that's part of a larger collection of infosec content available to our clients in the IANS Insights Portal.
This report explains some of the potential risks of serverless and
recommends ways to secure each component of your serverless
This report explains the key differences between on-prem and cloud
backups and offers recommendations for formulating an efficient,
cost-effective IaaS backup strategy.
This report explains the main factors to consider when choosing a security-as-code vendor and provides best practices for avoiding issues with security groups (SGs) in deployments.
This report updates clients on the top vulnerabilities and breaches from
the past quarter and provides some real-world context and perspective.
In this quarterly research report, we update IANS clients on the new developments occurring in the cloud security arena.
In this report, we bring you up to date on the current state of cloud
threats, peer into what to expect in 2021 and offer a structured
approach for tackling cloud security in an ever-changing landscape.
This checklist provides the most important and valuable controls for protecting email within Office 365.
This guide details some common zero trust architecture (ZTA) use cases
across people, applications and equipment, as well as the challenges
associated with each.
This questionnaire can be used as a guide for post-SolarWinds vendor
risk assessments. It can be tailored to your specific risk
The pandemic has prompted business leaders to increase cybersecurity
investments in five key areas. This chart shows the top cybersecurity
investments since the pandemic began.
Ransomware is a type of malicious software that encrypts computer files
and can bring a company's physical and digital operations to a
standstill, resulting in loss of data and productivity. IANS recommends 6
steps to protect your organization.
Everyday mobile applications collect users' location data and share it
with data brokers. This infographic – meant for employee security
awareness – offers tips to lock down mobile phones accordingly.
Part 1: IANS Faculty member Nick Mankovich covers the process of creating an initial threat list.
Part 2: IANS Faculty member Nick Mankovich provides guidance on taking a
prioritized threat list and presenting it to business stakeholders for
Part 3: IANS Faculty member Nick Mankovich discusses how to use a custom
threat model to inform decision-making within a security program.
The scope of the Russian hack on U.S. government agencies and companies continues to grow. The hack – which dates back to at least October 2019 – is believed to have impacted up to 250 federal agencies and companies.
Hackers are capitalizing on the pandemic-forced shift to remote work to exploit new vulnerabilities and break into corporate networks. Ensure remote employees understand their responsibilities.
Russian cybercriminals continue to target American hospitals with ransomware attacks – cutting off their access to electronic health records and forcing them to turn patients away.
We deliver what CISOs and their teams need most: unbiased, practical advice; the ability to speak with professionals who understand their challenges; and peer interaction to keep their knowledge and skills fresh and up-to-date.
End-User Decision Support is our flagship offering delivered through an annual subscription service designed for CISOs and their teams. IANS connects you with independent experts and practitioners who have ‘been there, seen it, and done it,’ enabling you to accelerate your capabilities and make informed decisions.
We work with you to shape engagements and provision them with the right IANS Faculty experts. Your project will never be staffed with junior level consultants. Our expertise is built from hands-on experience. We staff your project with doers who recommend
actions, and then help you take them.
Our events feature IANS Faculty members who offer a breadth of in-the-weeds advice and high-level guidance for the entire security team. Designed for you to engage with like-minded security professionals in a supportive environment, you’ll learn from a variety of industry approaches and use cases.