Content Type
Date Range
Blog | Apr/28/2025
Without AI governance, the privacy and security of a business’ information can be vulnerable and lacks visibility into the data that is being shared with third-parties. It’s impossible to see whether data is being used by AI or if AI is being misused. To make order out of this chaos, it’s key to develop and implement a formal AI governance program.
Blog | Apr/24/2025
Third-party risk should be a top priority for security leaders, as organizations are increasingly vulnerable to supply chain attacks and cloud threats. Here, we examine key third-party risks and how security leaders can mitigate them.
Tools & Guides | Apr/21/2025
Uncover risks and ensure responsible AI use across your vendor landscape with this comprehensive questionnaire designed to assess the security, privacy, compliance, and ethical standards of third-party AI tools.
Blog | Apr/17/2025
In 2025, quantum computing is not just a buzzword—it's becoming a reality that's capturing the attention of business leaders, technologists, and scientists alike. However, quantum computing also poses a significant threat to current encryption methods, especially asymmetric encryption, which is crucial for securing data in transit.
Tools & Guides | Apr/16/2025
This template is a dynamic, NIST-aligned guide that outlines a consistent incident handling process while allowing for the flexible addition of scenario-specific guidance.
Tools & Guides | Apr/14/2025
Securing OT/ICS environments requires a strategic approach that integrates IT and OT efforts. Enhance your operational resiliency and maintain robust security by following the priorities and recommendations outlined in this guide.
Blog | Apr/10/2025
Despite a long history of flexibility and cost effectiveness, open source software is still viewed as risky by some organizations. Open source software can be used just as safely as traditional closed source software. Learn the right processes and tools for securely managing open source in the organization.
Event | Apr/10/2025
IANS Executive Communications Incident Briefing: Treasury OCC Discloses Breach of Regulators' Emails
IANS Faculty Jake Williams will discuss the Treasury’s Office of the Comptroller of the Currency (OCC) disclosing to Congress that hackers intercepted 103 bank regulators’ emails for more than a year. Jake will discuss what we know and don’t know about this incident, what steps financial services organizations should be taking and how CISOs should be communicating to their executive teams.
Event | Apr/14/2025
IANS Faculty Jake Williams and Summer Fowler offer their perspectives on some of the biggest infosec-related news topics from the past few months -- cyber implications of the newly implemented tariffs, third-party risk management lessons from Oracle’s reported incidents and planning for quantum security risks. Jake and Summer will focus on how CISOs should be briefing their boards and executive teams on these topics.
Blog | Apr/3/2025
Earlier this month, Oracle suffered what is being called the biggest supply chain hack of 2025 so far. According to several sources, a breach occurred when 6 million records were exfiltrated from Oracle Cloud, affecting more than 140,000 tenants. IANS provides some key next steps to keep your data protected.
We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Policy.