Content Type
Date Range
Tools & Guides | Jun/4/2025
This template offers a structured framework for organizations to develop a robust threat intelligence program that will proactively identify, analyze, and respond to cyber threats.
Blog | Jun/3/2025
DeepSeek-R1, an advanced AI reasoning model has gained significant attention for its cost-effectiveness and capabilities. Despite its promising future and lower development costs, security leaders must carefully weigh the risks against the benefits.
Tools & Guides | Jun/3/2025
Access a summary of our recent Tech Briefing that reveals urgent cyber threats—including a zero-day exploit targeting Commvault and the Lumma Stealer malware takedown—and provides practical guidance to help security teams strengthen defenses and stay ahead.
Blog | May/29/2025
Large enterprise CISOs are managing multimillion-dollar security budgets while navigating increasingly complex roles. Despite high compensation many CISOs report low job satisfaction—leading a majority to remain open to new opportunities.
Blog | May/28/2025
IANS Senior Directors of Research Nick Kakolowski and Gina Glendening reflect on key infosec takeaways and trends they saw at RSAC Conference 2025.
Tools & Guides | May/21/2025
This document outlines a framework for establishing an application pen testing program. It serves as a guide for application security managers, highlighting the essential components and documentation required to develop an effective program.
Tools & Guides | May/20/2025
This free guide builds on CISA’s Zero Trust Maturity Model (ZTMM), offering practical controls, maturity objectives, and evidence aligned with NIST 800-171 to help you implement, evaluate and mature zero trust capabilities.
Blog | May/15/2025
Choosing a security vendor isn’t just a purchase—it’s a strategic move. CISOs who set clear expectations, run smart PoCs, and demand transparency build stronger, long-term security partnerships.
Event | May/16/2025
IANS Faculty Jake Williams will discuss Coinbase’s recent disclosure of a data breach, in which hackers stole customer data & are demanding a $20m ransom to not leak it. Coinbase – which stated it has not paid the ransom – said the stolen data includes customer names, addresses, phone numbers, email addresses, masked SSNs, govt IDs and passports. Jake will discuss what we know about the breach, what steps to take and what CISOs should be communicating to their executives.
We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Policy.