Content Type
Date Range
Blog | May/17/2022
Learn how to make progress with zero trust, including common zero trust use cases, success stories, tooling guidance and tips for effectiveness.
Blog | May/12/2022
Gain an understanding of the role executives play in incident response (IR). Find guidance on key actions to take before, during and after a security incident.
Blog | May/10/2022
Considering implementing a GRC tool? Learn the main features to look for when evaluating a GRC tool.
Blog | May/5/2022
Does your organization have a group of individuals who repeatedly fail phishing simulations? Gain an understanding of the issues behind repeat responders to phishing simulations and the steps to address them.
Blog | May/3/2022
With phishing being a frequent attack vector leading to ransomware, it’s important to have an extensive program in place to address the threat of ransomware. Learn how your team can effectively defend against both phishing and ransomware.
Blog | Apr/26/2022
A purple team combines elements of red and blue teams to create a collaborative security strategy. Explore ways to effectively create a purple team.
Blog | Apr/19/2022
Do you know the differences between red, blue and purple teams? Understand the responsibilities of red, blue and purple teams and their roles in strengthening security posture.
Tools & Guides | Apr/11/2022

Use our ‘Top 8 Soar Uses and Playbooks’ developed by IANS Faculty, Gal Shpantzer, to successfully augment your security strategy with SOAR.

Tools & Guides | Apr/11/2022
Gain insights on the implementation of zero trust tools and technologies in this step-by-step guide from IANS Faculty member, Dave Shackleford.
Blog | Apr/7/2022
Find guidelines on key prerequisites to ensure organizations are fully prepared to participate in purple team exercises.