Ending Soon! Get an iPad (32G), Galaxy Tab A, or $250 Off with OnDemand or vLive Training!

SANS Security Insights: Category - SANS Analyst

Advice to Vendors at RSA: Don't Ignore the Influencers

Advice to Vendors at RSA: Don't Ignore the Influencers

Vendors targeting their sales only to the C-level security pros in the Fortune 500 are severely limiting their opportunities.

By Deb Radcliff, Creative Director,SANS Analyst Program

A new survey being conducted CISO-level survey by Merritt Group and T.E.N. (publishing in April) asks CISOs how they buy InfoSec products, what influences their buy decisions and how they learn about products.


Security Visibility in AWS: Authority, Access and Capability

By Josh Thurston

Sr. Category Lead, Security, AWS

Authority, access and capability are intertwined elements for building visibility into the cloud. Continue reading Security Visibility in AWS: Authority, Access and Capability


Workforce Automation and the Cloud: A Dichotomy

The subject of workforce transformation and the security challenges it poses came down to cloud enablement versus cloud risk, based on new SANS survey.

By Deb Radcliff, Creative Director,SANS Analyst Program

Enterprise users are rightly worried about security and data protection when utilizing workforce apps in public clouds like Google , AWS and Microsoft Azure , according to a new SANS survey on workforce transformation, which published on Dec. 18 during a live webcast . In the survey, workforce transformation was described as meeting the needs for employees to work anytime, anywhere, from any device.


How to Build a Successful Cloud Security Program

Ryan Davis

Every organization's cybersecurity program is unique. This comes as no surprise since every enterprise has a distinct IT architecture and uses different types of applications.


AI Wars

Artificial intelligence in cybersecurity can introduce accidental or intentional bias that results in false security data.

By Deb Radcliff, Creative Director,SANS Analyst Program

The benefits of AI in cybersecurity are hard to dispute. When implemented properly, AI enhances detection and response, improves access controls, aids with threat hunting and other capabilities, and uses machine learning to continually improve response.