Content Type
Date Range
Blog | Apr/19/2022
Do you know the differences between red, blue and purple teams? Understand the responsibilities of red, blue and purple teams and their roles in strengthening security posture.
Tools & Guides | Apr/11/2022

Use our ‘Top 8 Soar Uses and Playbooks’ developed by IANS Faculty, Gal Shpantzer, to successfully augment your security strategy with SOAR.

Tools & Guides | Apr/11/2022
Gain insights on the implementation of zero trust tools and technologies in this step-by-step guide from IANS Faculty member, Dave Shackleford.
Blog | Apr/7/2022
Find guidelines on key prerequisites to ensure organizations are fully prepared to participate in purple team exercises.
Blog | Mar/31/2022
Understand what a purple team exercise is and learn important steps for creating effective purple team exercises that strengthen your security program.
Blog | Mar/29/2022
Guidance for third-party risk management to build a best practices checklist and comprehensively manage organizational risk across all external service providers.
Blog | Mar/24/2022
Learn the steps information security teams must take to build a solid third-party risk management framework that mitigates organizational third-party risk.
Blog | Mar/22/2022
Identify the key areas to consider when formalizing a vulnerability management program. Find guidance on standards, policies and procedures; vulnerability lifecycle management; operating system patching; and communication with stakeholders to ensure your security team gets it right.
Blog | Mar/17/2022
Learn the steps information security teams and organizations must take to build an effective third-party risk management process that mitigates organizational risk.
Blog | Mar/10/2022
Learn how to build an organizational phishing metrics matrix to better gauge organizational resilience, identify areas of concern to strengthen your security awareness program.