All Blogs

Showing 253-261 of 366
Identity and Access Management

Centralized IAM Best Practices

December 16, 2021
Organizations making significant investments in cloud services should plan to build a centralized IAM function and focus on five key principles. Here are best practices to follow and pitfalls to avoid when moving to centralized IAM.
IANS Faculty

Digital Transformation Driving CISO Maturation

December 15, 2021
Learn more about how IANS is helping aspiring security leaders and CISOs navigate the current digital transformation with our research-based Executive Competencies program.
Phil Gardner
Management and Leadership

IAM Roadmap Best Practices

December 14, 2021
Learn what a typical IAM roadmap entails and find best practices to ensure your IAM program supports the business efficiently and effectively.
IANS Faculty
Threats & Vulnerabilities

Modern Ransomware Requires More Than Just Good Backups

December 9, 2021
A strong backup solution will minimize the impact of ransomware attacks, but backups alone are not enough protection. Find best practices aimed at building a holistic data protection strategy that will help organizations avoid paying a ransom.
IANS Faculty
Infrastructure

Considerations for a Move from an E3 to E5 License for M365

December 7, 2021
Identify and understand key decision points to consider when evaluating a transition from M365 E3 licenses to E5 licenses for email hygiene, endpoint protection and eDiscovery/compliance.
IANS Faculty
Management and Leadership

Three Security Initiatives to Consider in 2022

December 2, 2021
As the end of the year approaches, security leaders are starting to plan their strategic and tactical roadmaps for the year ahead. Here is a list of three security initiatives to consider in 2022.
IANS Faculty
Security Operations

Key Server and Endpoint Security Metrics to Track

November 30, 2021
The most valuable server and endpoint security metrics for security teams tend to help improve the security program overall. Here is a list of key server and endpoint security metrics to use for reporting.
IANS Faculty
Security Operations

Guidance for Building a Security Data Lake

November 23, 2021
Understand how data lakes differ from SIEMs, and guidance for planning, building, and securing a security data lake.
IANS Faculty
Security Operations

How to Evaluate the Viability of a Data Lake for Security

November 18, 2021
Are data lakes a viable option for your security program? Gain a better understanding of data lakes and learn the advantages and challenges of implementing them for security.
IANS Faculty