Content Type
Date Range
Blog | Dec/2/2021
As the end of the year approaches, security leaders are starting to plan their strategic and tactical roadmaps for the year ahead. Here is a list of three security initiatives to consider in 2022.
Blog | Nov/30/2021
The most valuable server and endpoint security metrics for security teams tend to help improve the security program overall. Here is a list of key server and endpoint security metrics to use for reporting.
Blog | Nov/23/2021
Understand how data lakes differ from SIEMs, and guidance for planning, building, and securing a security data lake.
Blog | Nov/16/2021
Find the top commercial and open source container and orchestration tools to consider within a cloud environment, along with recommendations for ensuring your architecture is secure, compliant and well-positioned for scale.
Tools & Guides | Nov/9/2021
Learn how to harden M365 Identities and Exchange Online from IANS Faculty, Aaron Turner. Prioritize activities that protect against Azure AD and Exchange Online attacks.
Blog | Nov/4/2021
IANS Faculty member Nicole Dove provides a detailed overview of the BISO (business information security officer) role and explains how it works to improve both business and security outcomes.
Blog | Oct/28/2021
Learn how to create ransomware tabletop exercises focused on executive responsibilities, including actions executives should take in preparation of, and in response to, a ransomware attack.
Blog | Oct/21/2021
Find a structured plan to help your organization successfully transition from NIST SP 800-53 Rev. 4 to Rev. 5 controls within your security and privacy management programs.
Blog | Oct/19/2021
Continuous compliance requires continuous monitoring and validation of controls in the environment, as well as integration with governance, risk management and compliance tools and platforms. Understand the processes, tools, stakeholders and focus required for a best practice continuous compliance program.
Blog | Oct/12/2021
Uncertain how to secure your M365 environment? Our Faculty identify and explain the five primary areas of M365 that will provide the best security return-on-investment with the least user experience impacts.
We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Policy.