The most recent content from our members.
Phishing and malware are scary enough, but the number one tactic used by bad actors to get access to and take over accounts is something different: using compromised credentials. Why? Because it’s so easy! Data breaches happen almost constantly, and credentials get leaked. At the same time, people are prone to reuse the…
Ready to implement or expand a successful security program for your customers? In this episode of SolarWinds TechPod, SolarWinds VP of security Tim Brown and senior channel sales specialist Stefanie Hammond discuss the steps you can take.…
In this episode of SolarWinds TechPod, Tech Talks, host Alex Navarro discusses security threats, the importance of practicing good cyber hygiene, and best practices for managing users and their devices with Mav Turner, Denny LeCompte, and Jim Hansen of SolarWinds.…
Omar Rafik, SolarWinds Senior Manager, Federal Sales Engineering Here’s an interesting article by my colleague Brandon Shopp with ideas for protecting IT assets in battlefield situations. “Dominance” and “protection” sum up the Defense Department’s goals as U.S. armed forces begin to modernize their networks and…
Omar Rafik, SolarWinds Senior Manager, Federal Sales Engineering Here’s an interesting article by my colleague Mav Turner about how complying with federal frameworks can help improve security. Intruders are using new tactics and threats are increasing, so please take note. Over the past few years, several critical…
Looking for ideas on how your end users can help enhance your organization’s security posture? Read this article by Brandon Shopp, group vice president of product strategy at SolarWinds, which provides some great tips. As cyberattacks become more sophisticated across ever-expanding attack surfaces, it’s easy to assume the…
In the first blog of this series, we became familiar with some well-used cybersecurity terminology. This blog will look at some well-known attack and threat types and how they can be perpetrated. As a couple of readers pointed out, the definition of threat should focus on malicious (or inadvertent) actions on a computer…
Automation is increasingly one of the cornerstones of an optimized federal IT environment. If you’re a federal IT pro, you may be asking, “Will automation make my job easier?” The answer is a resounding “yes,” as automation can dramatically enhance overall agency performance on multiple levels. Let’s start with automating…
Omar Rafik, SolarWinds Senior Manager, Federal Sales Engineering Here’s an interesting article by my colleague Jim Hansen reviewing data from our cybersecurity survey, including details on how agencies are combatting threats. According to a 2019 Federal Cybersecurity Survey released last year by IT management software…
Omar Rafik, SolarWinds Senior Manager, Federal Sales Engineering Here’s an interesting article by my colleague Brandon Shopp with ideas for improving security at the DoD by finding vulnerabilities and continuously monitoring agency infrastructure. An early 2019 report from the Defense Department Officer of Inspector…
It looks like you're new here. Sign in or register to get started.