Search IANS
Content Type
Date Range
Blog | May/26/2022
Understand six common types of social engineering attacks and learn how to develop a tailored strategy to address and mitigate organizational risk.
Blog | Apr/26/2022
A purple team combines elements of red and blue teams to create a collaborative security strategy. Explore ways to effectively create a purple team.
Blog | Apr/19/2022
Do you know the differences between red, blue and purple teams? Understand the responsibilities of red, blue and purple teams and their roles in strengthening security posture.
Tools & Guides | Apr/11/2022
Use our ‘Top 8 Soar Uses and Playbooks’ developed by IANS Faculty, Gal Shpantzer, to successfully augment your security strategy with SOAR.
Tools & Guides | Apr/11/2022
Gain insights on the implementation of zero trust tools and technologies in this step-by-step guide from IANS Faculty member, Dave Shackleford.
Blog | Mar/31/2022
Understand what a purple team exercise is and learn important steps for creating effective purple team exercises that strengthen your security program.
Blog | Mar/29/2022
Guidance for third-party risk management to build a best practices checklist and comprehensively manage organizational risk across all external service providers.
Blog | Mar/3/2022
Discover potential container security challenges and find best practices for security teams to build a container security plan that mitigates organizational risk.
Blog | Feb/22/2022
Learn how to create an effective anti-vishing program and conduct vishing test exercises to improve employee awareness and resilience, without adversely impacting the business.
Blog | Feb/15/2022
Cybersecurity asset management products can provide great value to teams. Learn about challenges and techniques to get the most out of these tools.
We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Policy.