The most recent content from our members.
As organizations expand across industries and regions, they face a complex web of regulations and a constantly shifting threat landscape. The consequences of non-compliance can be severe, including legal penalties, financial losses, reputational damage, and operational disruptions. So, how can businesses stay ahead of…
The National Institute of Standards and Technology (NIST) developed the NIST 800-171 framework to set guidelines and security requirements for protecting Controlled Unclassified Information (CUI). The latest version three (V3) brings significant revisions impacting organizations' handling of CUI. In this blog, I'll explore…
The Center for Internet Security Critical Security Controls (CIS Controls) are prioritized Safeguards to mitigate the most prevalent cyber-attacks against systems and networks. CIS Controls Version 8 have been enhanced to keep up with modern systems and software. The update has been spurred on by issues such as the move to…
The NIS2 Directive will be a significant step forward in the European Union’s efforts to enhance cybersecurity across the Union. It lays down measures for a high common level of cybersecurity, which companies in scope must adhere to. In this blog post, we’ll explore the NIS2 Directive and how SolarWinds products can help…
It might be a well-kept secret outside of IT departments, but insiders know the reality; permission structures are often suboptimal. The reason for this is permission structures have grown historically, some say even hysterically, over time. One cause is quick fixes applied with the intent to replace with a proper solution…
SolarWinds Access Rights Manager (ARM) 9.2 is available on the customer portal! Please refer to the release notes for a broad overview of this release. Most of you are using cloud services in your IT environments today, living in and managing a hybrid world. With the release of ARM 9.1 we already have taken this into…
What is TISAX®? TISAX® is a European automotive industry-standard information security assessment (ISA) catalog based on key aspects of information security such as data protection, integrity, and connection to third parties. It was developed by the German Association of the Automotive Industry (VDA) for the specific needs…
In any organization, managing user permissions is a necessity based on compliance requirements, an important but too often unappreciated and manual task still needing to be performed by most administrators or IT staff today. If it worked so far, why change it at all? The workload on today’s administrators has changed.…
SolarWinds Access Rights Manager (ARM) 2019.4 is available on the Customer Portal! Please refer to the release notes for a broad overview of this release. Previous releases of ARM extended the existing access rights permission visibility into Active Directory, Exchange, and file servers by Microsoft OneDrive and Microsoft…
As a part of an effort to help untangle compliance initiatives, a popular request on the federal side is FISMA (Federal Information Systems Management Act) Compliance and support for the Risk Management Framework (RMF). In this post, I’ll outline what FISMA compliance is, we’ll walk through FISMA bit-by-bit, and we’ll talk…
It looks like you're new here. Sign in or register to get started.