All Blogs

Showing 1-9 of 62
Threats & Vulnerabilities

Guidance to Mature Your Threat Modeling Program

July 4, 2023
Learn how to develop a threat modeling program along with guidance to select a framework to reach threat modeling maturity.
IANS Faculty
Threats & Vulnerabilities

How to Build a 5-Step Ransomware Incident Response Plan

June 13, 2023
A ransomware attack can be disastrous, so it's important to be prepared. Learn how to create a 5-step ransomware incident response plan to mitigate harm.
IANS Faculty
Threats & Vulnerabilities

How to Prevent Smishing Attacks Effectively

June 6, 2023
Find guidance on how to prevent smishing attacks, along with best practices for building an effective smishing program that will protect your organization.
IANS Faculty
Threats & Vulnerabilities

A Guide to Automated Pen Testing Tools

April 27, 2023
Discover our expert insight on the types of automated pen testing tools available, choosing the right one for your needs, and getting the most out of these tools.
IANS Faculty
Threats & Vulnerabilities

Creating a Threat Model in 4 Efficient Steps

January 5, 2023
Discover our steps and tips for analyzing your threat landscape and creating a threat model that's specific to your industry using third-party research assets.
IANS Faculty
Threats & Vulnerabilities

Threat Model Business Alignment Checklist

January 3, 2023
Learn how to build a threat model specific to your organization. Use this actionable checklist as a guide to collaborate and align business input.
IANS Faculty
Threats & Vulnerabilities

Software Supply Chain Threat Modeling Checklist

December 15, 2022
Mitigate supply chain risk by threat modeling third-party software and services as they are deployed into the environment. Save time with help from this actionable checklist that follows the Microsoft Security Development Lifecycle.
IANS Faculty
Threats & Vulnerabilities

Checklist for Detecting Ransomware Precursors

November 21, 2022
Detect the precursors of a typical ransomware deployment with help from this actionable, time-saving checklist.
IANS Faculty
Threats & Vulnerabilities

The Most Common Ransomware Attacks & How to Prepare for Them

November 17, 2022
Ransomware attacks are becoming more frequent. Explore the most common ransomware attacks, along with ways to prevent and recover from them.
IANS Faculty