All Blogs

Showing 208-216 of 359
Threats & Vulnerabilities

What is a Purple Team? Strategies for Effective Collaboration

April 26, 2022
A purple team combines elements of red and blue teams to create a collaborative security strategy. Explore ways to effectively create a purple team.
IANS Faculty
Threats & Vulnerabilities

Data Exfiltration: Threats, Challenges and Prevention

April 21, 2022
Gain a solid understanding of data exfiltration, what causes it, and find best practices to protect your organization from outside and insider threats.
IANS Faculty
Threats & Vulnerabilities

Understand the Roles of Red, Blue and Purple Teams

April 19, 2022
Do you know the differences between red, blue and purple teams? Understand the responsibilities of red, blue and purple teams and their roles in strengthening security posture.
IANS Faculty
Threats & Vulnerabilities

How to Build a Proactive Threat Hunting Strategy

April 14, 2022
Understand how building an efficient proactive threat hunting strategy can lower the risk of compromised security, data breaches and other serious cyberattacks.
IANS Faculty
Threats & Vulnerabilities

How to Harness the Power of Purple Teaming

April 12, 2022
Understand the prerequisites, roles and responsibilities, as well as best practices for conducting effective purple team exercises.
IANS Faculty
Threats & Vulnerabilities

Purple Team Exercise Readiness Checklist

April 7, 2022
Find guidelines on key prerequisites to ensure organizations are fully prepared to participate in purple team exercises.
IANS Faculty
Threats & Vulnerabilities

Threat Hunting 101: Understand the Basics

April 5, 2022
Learn how to improve internal hunting capabilities, while keeping investment costs down, by understanding the foundational elements of a sound threat hunting program.
IANS Faculty
Threats & Vulnerabilities

Best Practices for Building Effective Purple Team Exercises

March 31, 2022
Understand what a purple team exercise is and learn important steps for creating effective purple team exercises that strengthen your security program.
IANS Faculty
Managing Vendors and Third Parties

Building a Third-Party Risk Management Checklist

March 29, 2022
Guidance for third-party risk management to build a best practices checklist and comprehensively manage organizational risk across all external service providers.
IANS Faculty

Subscribe to IANS Blog

Receive a wealth of trending cyber tips and how-tos delivered directly weekly to your inbox.

Please provide a business email.