Content Type
Date Range
Blog | Dec/16/2021
Organizations making significant investments in cloud services should plan to build a centralized IAM function and focus on five key principles. Here are best practices to follow and pitfalls to avoid when moving to centralized IAM.
Blog | Dec/14/2021
Learn what a typical IAM roadmap entails and find best practices to ensure your IAM program supports the business efficiently and effectively.
Blog | Dec/7/2021
Identify and understand key decision points to consider when evaluating a transition from M365 E3 licenses to E5 licenses for email hygiene, endpoint protection and eDiscovery/compliance.
Blog | Dec/2/2021
As the end of the year approaches, security leaders are starting to plan their strategic and tactical roadmaps for the year ahead. Here is a list of three security initiatives to consider in 2022.
Blog | Nov/30/2021
The most valuable server and endpoint security metrics for security teams tend to help improve the security program overall. Here is a list of key server and endpoint security metrics to use for reporting.
Blog | Nov/23/2021
Understand how data lakes differ from SIEMs, and guidance for planning, building, and securing a security data lake.
Blog | Nov/16/2021
Find the top commercial and open source container and orchestration tools to consider within a cloud environment, along with recommendations for ensuring your architecture is secure, compliant and well-positioned for scale.
Tools & Guides | Nov/9/2021
Learn how to harden M365 Identities and Exchange Online from IANS Faculty, Aaron Turner. Prioritize activities that protect against Azure AD and Exchange Online attacks.
Blog | Nov/4/2021
IANS Faculty member Nicole Dove provides a detailed overview of the BISO (business information security officer) role and explains how it works to improve both business and security outcomes.
Blog | Oct/28/2021
Learn how to create ransomware tabletop exercises focused on executive responsibilities, including actions executives should take in preparation of, and in response to, a ransomware attack.
We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Policy.