Content Type
Date Range
Blog | Apr/10/2025
Despite a long history of flexibility and cost effectiveness, open source software is still viewed as risky by some organizations. Open source software can be used just as safely as traditional closed source software. Learn the right processes and tools for securely managing open source in the organization.
Event | Apr/10/2025
IANS Executive Communications Incident Briefing: Treasury OCC Discloses Breach of Regulators' Emails
IANS Faculty Jake Williams will discuss the Treasury’s Office of the Comptroller of the Currency (OCC) disclosing to Congress that hackers intercepted 103 bank regulators’ emails for more than a year. Jake will discuss what we know and don’t know about this incident, what steps financial services organizations should be taking and how CISOs should be communicating to their executive teams.
Event | Apr/14/2025
IANS Faculty Jake Williams and Summer Fowler offer their perspectives on some of the biggest infosec-related news topics from the past few months -- cyber implications of the newly implemented tariffs, third-party risk management lessons from Oracle’s reported incidents and planning for quantum security risks. Jake and Summer will focus on how CISOs should be briefing their boards and executive teams on these topics.
Blog | Apr/3/2025
Earlier this month, Oracle suffered what is being called the biggest supply chain hack of 2025 so far. According to several sources, a breach occurred when 6 million records were exfiltrated from Oracle Cloud, affecting more than 140,000 tenants. IANS provides some key next steps to keep your data protected.
Event | Apr/22/2025
Many of IANS’ enterprise clients are actively considering or executing on Zero Trust initiatives, based on the frequency and number of inquiries we’ve observed. These organizations have a very wide variety of maturity levels and degree of progress in their Zero Trust journeys, but they do have one thing consistently in common: a clear need for an organizing structure for their Zero Trust initiatives.
While the information security industry has several broadly used maturity models, as well as many types of IT project management frameworks, there is no well-defined approach to Zero Trust. This is a gap—enterprises need a Zero Trust structure that properly captures its breadth, as well as the interdependencies between the key elements of access policies, the tools, technologies, and capabilities which enable them, and their impact on organizational maturity.
Tools & Guides | Mar/28/2025
This report details the main cyber threats and vulnerabilities faced by organizations in the healthcare sector today and recommends ways to shore up defenses.
Blog | Mar/27/2025
Access key healthcare data sets from the latest IANS and Artico Search’s 2025 Compensation and Budget for CISOs in Healthcare Benchmark Report. Gain valuable insights on healthcare budget trends, CISO compensation, and the drivers behind them.
Page
What does 2025 hold for InfoSec Practitioners in Healthcare? IANS Research is here to guide you through the evolving threat landscape that lays ahead
Tools & Guides | Mar/26/2025
This guide acts as a HIPAA cheat sheet, enabling you to balance the need for information flow in the healthcare system while protecting patient privacy.
We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Policy.