All Blogs
Showing 1-9 of 25
Data Protection, Integrity and Availability
How to Manage Open-Source Software Securely
April 10, 2025
Despite a long history of flexibility and cost effectiveness, open source software is still viewed as risky by some organizations. Open source software can be used just as safely as traditional closed source software. Learn the right processes and tools for securely managing open source in the organization.
Josh More, IANS Faculty
Security Operations
Cookie Security Checklist: Lock Down Your Data
December 27, 2023
Use this checklist of key settings for web application developers to ensure cookies are fully locked down and prevent security breaches.
IANS Research
Security Operations
IANS Faculty 2024 Cyber Predictions: Machine Learning and Security Branches Out
December 21, 2023
As the year draws to a close, IANS Faculty provide their 2024 Cyber Predictions to strengthen your cyber posture. Watch our video with Allison Miller for tips to plan your 2024 infosec roadmap.
IANS Research
Security Operations
Public vs Private API Security: Use a Three-Step Approach
September 14, 2023
Learn how to use a three-step approach to defending and managing public and private APIs while avoiding common mistakes.
IANS Faculty
Security Operations
Understand First- and Second-Gen SAST: Guidelines for the Best Choice
September 12, 2023
Understand the main differences between first- and second-gen SAST tools and learn how to determine which will work best for your environment.
IANS Faculty
Security Operations
How to Select the Right DAST and SAST Tools
July 13, 2023
IANS Faculty member, Tanya Janca discusses pros and cons of DAST and SAST tools and provides guidance on how to select the right tools for your needs.
Tanya Janca, IANS Faculty
Security Operations
How to Solve DAST and SAST Tool Challenges
June 15, 2023
Overcome challenges with DAST and SAST tools using practical tips from IANS faculty. Learn how to enhance your application security & streamline test processes.
Tanya Janca, IANS Faculty
Security Operations
ChatGPT: Misuse Scenarios & Security Risks of AI
May 11, 2023
ChatGPT use has expanded exponentially in recent years and it's important to consider possible misuse scenarios. Read on to discover the security risks of AI.
IANS Faculty
Security Operations
Detect Identity-Based Threats Using Your SIEM
May 2, 2023
Gain an understanding of the importance of normalizing IAM data, along with some key IAM events to log/monitor and find best practices to ease the process.
IANS Faculty
We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Policy.