Search IANS

Content Type
Date Range
Blog | May/26/2022
Understand six common types of social engineering attacks and learn how to develop a tailored strategy to address and mitigate organizational risk.
Blog | Apr/26/2022
A purple team combines elements of red and blue teams to create a collaborative security strategy. Explore ways to effectively create a purple team.
Blog | Apr/19/2022
Do you know the differences between red, blue and purple teams? Understand the responsibilities of red, blue and purple teams and their roles in strengthening security posture.
Tools & Guides | Apr/11/2022

Use our ‘Top 8 Soar Uses and Playbooks’ developed by IANS Faculty, Gal Shpantzer, to successfully augment your security strategy with SOAR.

Tools & Guides | Apr/11/2022
Gain insights on the implementation of zero trust tools and technologies in this step-by-step guide from IANS Faculty member, Dave Shackleford.
Blog | Mar/31/2022
Understand what a purple team exercise is and learn important steps for creating effective purple team exercises that strengthen your security program.
Blog | Mar/29/2022
Guidance for third-party risk management to build a best practices checklist and comprehensively manage organizational risk across all external service providers.
Blog | Mar/3/2022
Discover potential container security challenges and find best practices for security teams to build a container security plan that mitigates organizational risk.
Blog | Feb/22/2022
Learn how to create an effective anti-vishing program and conduct vishing test exercises to improve employee awareness and resilience, without adversely impacting the business.
Blog | Feb/15/2022
Cybersecurity asset management products can provide great value to teams. Learn about challenges and techniques to get the most out of these tools.