All Blogs

Showing 271-279 of 366
Management and Leadership

Who Should the CISO Report To?

March 15, 2022
Gain a better understanding of the different types of CISO reporting structures and examine reasons for having a CISO report to technical director instead of a chief information officer (CIO) or another C-level executive.
IANS Faculty
Threats & Vulnerabilities

DDoS Attack Prevention and Response Tactics

October 14, 2021
Learn how the DDoS threat is evolving and get a step-by-step playbook to ensure your organization is protected against DDoS attacks and has a response plan in place.
IANS Faculty
Enterprise Software

5 Ways to Configure M365 to Improve Security

October 12, 2021
Uncertain how to secure your M365 environment? Our Faculty identify and explain the five primary areas of M365 that will provide the best security return-on-investment with the least user experience impacts.
IANS Faculty
Management and Leadership

What Security Teams Want to Know About Communicating with Execs About Ransomware

October 7, 2021
Gain insights into what other security teams are asking our Faculty members on how best to communicate with executive leadership about ransomware.
IANS Faculty
Identity and Access Management

Enterprise Security Architecture Best Practices

October 5, 2021
Learn how to create an efficient enterprise architecture that can be maintained and support the business over time to help strategically align CIO, CTO and CISO priorities.
IANS Faculty
Threats & Vulnerabilities

What Security Teams Want to Know About Responding to Ransomware Attacks

September 30, 2021
Get first-hand insights into what other security teams want to know about how to respond to ransomware attacks based on the questions they ask our Faculty.
IANS Research
Threats & Vulnerabilities

Creating an Effective Cyber Threat Intelligence Framework

September 28, 2021
Learn how to design a cyber threat intelligence framework with our workflow example and expert tips to ensure your CTI program is effective and actionable.
IANS Faculty
Threats & Vulnerabilities

Ransomware Prevention Best Practices for Security Teams

September 23, 2021
Explore ransomware prevention best practices and common questions to properly allocate resources and help your security team stay ahead of threats.
IANS Research
Identity and Access Management

Traditional AD vs. Azure AD Comparison Guide

September 16, 2021
Compare traditional AD vs. Azure AD, gain an understanding of how the two tools differ from a security perspective and find advice on how to deploy them successfully.
IANS Faculty