Content Type
Date Range
Tools & Guides | Apr/21/2025
Uncover risks and ensure responsible AI use across your vendor landscape with this comprehensive questionnaire designed to assess the security, privacy, compliance, and ethical standards of third-party AI tools.
Blog | Apr/17/2025
In 2025, quantum computing is not just a buzzword—it's becoming a reality that's capturing the attention of business leaders, technologists, and scientists alike. However, quantum computing also poses a significant threat to current encryption methods, especially asymmetric encryption, which is crucial for securing data in transit.
Tools & Guides | Apr/16/2025
This template is a dynamic, NIST-aligned guide that outlines a consistent incident handling process while allowing for the flexible addition of scenario-specific guidance.
Tools & Guides | Apr/14/2025
Securing OT/ICS environments requires a strategic approach that integrates IT and OT efforts. Enhance your operational resiliency and maintain robust security by following the priorities and recommendations outlined in this guide.
Blog | Apr/10/2025
Despite a long history of flexibility and cost effectiveness, open source software is still viewed as risky by some organizations. Open source software can be used just as safely as traditional closed source software. Learn the right processes and tools for securely managing open source in the organization.
Event | Apr/10/2025
IANS Executive Communications Incident Briefing: Treasury OCC Discloses Breach of Regulators' Emails
IANS Faculty Jake Williams will discuss the Treasury’s Office of the Comptroller of the Currency (OCC) disclosing to Congress that hackers intercepted 103 bank regulators’ emails for more than a year. Jake will discuss what we know and don’t know about this incident, what steps financial services organizations should be taking and how CISOs should be communicating to their executive teams.
Event | Apr/14/2025
IANS Faculty Jake Williams and Summer Fowler offer their perspectives on some of the biggest infosec-related news topics from the past few months -- cyber implications of the newly implemented tariffs, third-party risk management lessons from Oracle’s reported incidents and planning for quantum security risks. Jake and Summer will focus on how CISOs should be briefing their boards and executive teams on these topics.
Blog | Apr/3/2025
Earlier this month, Oracle suffered what is being called the biggest supply chain hack of 2025 so far. According to several sources, a breach occurred when 6 million records were exfiltrated from Oracle Cloud, affecting more than 140,000 tenants. IANS provides some key next steps to keep your data protected.
Event | Apr/22/2025
Many of IANS’ enterprise clients are actively considering or executing on Zero Trust initiatives, based on the frequency and number of inquiries we’ve observed. These organizations have a very wide variety of maturity levels and degree of progress in their Zero Trust journeys, but they do have one thing consistently in common: a clear need for an organizing structure for their Zero Trust initiatives.
While the information security industry has several broadly used maturity models, as well as many types of IT project management frameworks, there is no well-defined approach to Zero Trust. This is a gap—enterprises need a Zero Trust structure that properly captures its breadth, as well as the interdependencies between the key elements of access policies, the tools, technologies, and capabilities which enable them, and their impact on organizational maturity.
We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Policy.