Content Type
Date Range
Event | Nov/12/2025
The leading cause of data breaches and security issues has been compromised credentials. These are the very things we rely on for solving security and they are the area most successfully attacked. Moreover, that trend is only intensifying as adversaries increasingly leverage GenAI in their attacks; data shows that ATO attempts have increased 46% between 2023 and mid-2025, largely driven by AI-enhanced phishing and social engineering attacks. In this webinar, IANS Faculty Gunnar Peterson offers new ways to think about our most foundational control, authentication, by looking at AuthN from a threat perspective.
Blog | Oct/21/2025
Cybersecurity Awareness Month highlights a problem: one-month campaigns don't create lasting change. Learn why year-round org engagement and training are essential for building real security habits.
Blog | Oct/16/2025
Our newly released 2025 Security Organizational Design Benchmark Report reveals how top-performing organizations structure their security teams—and provides a roadmap for CISOs looking to mature their operations.
Event | Dec/3/2025
The buzz around Agentic AI – the latest form of AI systems designed to autonomously make decisions and act – is rampant. As security leaders grapple to understand the nuances of this next wave of AI excitement, there are many considerations to take into account to determine if, where and how to experiment and accelerate its use within your environment. In this symposium, IANS Faculty cuts through the noise and shares practical insights and recommendations to aid your understanding of the technology, its risks and guardrails for adoption within your enterprise.
Event | Nov/11/2025
The November Privacy Briefing will feature IANS Faculty members Lisa Perdelwitz and Jodi Daniels. This informal discussion will explore recent legal developments and anticipated rulings, highlighting how they influence AI strategies and surface emerging privacy risks. We will examine how infosec leaders can collaborate across teams to not only implement and operationalize privacy and data protection requirements, but also proactively manage the evolving landscape of AI-driven data challenges.
Blog | Oct/7/2025
Organizations should begin systematic preparation for quantum computing while also keeping their focus on more immediate security priorities.
Blog | Oct/2/2025
Discover how cybercriminals are shifting from ransomware to extortion-only attacks and learn what organizations can do to defend against these evolving threats.
We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Policy.