Content Type
Date Range
Blog | Dec/14/2021
Learn what a typical IAM roadmap entails and find best practices to ensure your IAM program supports the business efficiently and effectively.
Blog | Dec/7/2021
Identify and understand key decision points to consider when evaluating a transition from M365 E3 licenses to E5 licenses for email hygiene, endpoint protection and eDiscovery/compliance.
Blog | Dec/2/2021
As the end of the year approaches, security leaders are starting to plan their strategic and tactical roadmaps for the year ahead. Here is a list of three security initiatives to consider in 2022.
Blog | Nov/30/2021
The most valuable server and endpoint security metrics for security teams tend to help improve the security program overall. Here is a list of key server and endpoint security metrics to use for reporting.
Blog | Nov/23/2021
Understand how data lakes differ from SIEMs, and guidance for planning, building, and securing a security data lake.
Blog | Nov/16/2021
Find the top commercial and open source container and orchestration tools to consider within a cloud environment, along with recommendations for ensuring your architecture is secure, compliant and well-positioned for scale.
Tools & Guides | Nov/9/2021

Learn how to harden M365 Identities and Exchange Online from IANS Faculty, Aaron Turner. Prioritize activities that protect against Azure AD and Exchange Online attacks.

Blog | Nov/4/2021
IANS Faculty member Nicole Dove provides a detailed overview of the BISO (business information security officer) role and explains how it works to improve both business and security outcomes.
Blog | Oct/28/2021
Learn how to create ransomware tabletop exercises focused on executive responsibilities, including actions executives should take in preparation of, and in response to, a ransomware attack.
Blog | Oct/21/2021
Find a structured plan to help your organization successfully transition from NIST SP 800-53 Rev. 4 to Rev. 5 controls within your security and privacy management programs.