All Blogs

Showing 280-288 of 362
Threats & Vulnerabilities

How to Respond to Ransomware Attacks

August 31, 2021
Ransomware attacks can happen to organizations at any time, anywhere. Learn how to create a ransomware response plan to mitigate damage from attacks.
IANS Faculty
Management and Leadership

What Questions Are CISOs Asking?

August 26, 2021
See the questions CISOs and other security leaders asked our 80-plus member Faculty of security practitioners as part of our Ask-An-Expert service in the areas of executive communications, strategy and resource allocation.
IANS Research
Application Development

Shift Left Roadmap Best Practices

August 24, 2021
Taking on a shift left roadmap requires a strong partnership between security and development. This piece outlines best practices and tips to ensure the initiative goes smoothly.
IANS Faculty
Managing Vendors and Third Parties

Best Practices for Secure and Effective Third-Party PoCs

August 19, 2021
Understand how to balance the needs of the business and security by establishing policies, procedures and resources for a secure and effective third-party proofs of concept (PoCs).
IANS Faculty
IANS Faculty Profile

Who Are the IANS Faculty?

August 17, 2021
Gain a better understanding of the IANS Faculty, our team of over 100+ information security practitioners at the core of all IANS' client offerings.
IANS Research
Management and Leadership

How to Create an Effective IAM Program

August 12, 2021
Understand the requirements for and learn how to create an effective IAM program and operational structure.
IANS Faculty
Identity and Access Management

Key Considerations for Break-Glass Access in Azure AD

August 10, 2021
Understand the primary options that information security teams should consider, and pitfalls to avoid, when creating break-glass access in Azure AD.
IANS Faculty
Incident Response & Recovery

The Cost of Ransomware vs. Additional Backups for Recovery

August 5, 2021
Examine the potential or estimated cost of ransomware and weigh that against adding a tertiary backup to the cloud to ease ransomware recovery.
IANS Faculty
Threats & Vulnerabilities

Data Exfiltration: Insider Threat Detection & Prevention Tactics

August 3, 2021
Understand the most common data exfiltration examples and find guidance on how to detect and prevent the exfiltration of sensitive company data.
IANS Faculty