The most recent content from our members.
In yesterday's Dark Reading, security researcher Bruce Schneier took a swipe at security training: "If four-fifths of company employees learn to choose better passwords, or not to click on dodgy links, one-fifth still get it wrong and the bad guys still get in." It's not every day that I disagree with the author of…
Alright Security folks, WEBCAST TIME!! What is this all about? This webcast will discuss and showcase how various organizations are dealing with IT security. You will get to know whether these organizations are implementing tools and techniques to deal with their security data analytics problems, are they automating…
On Friday the 13th, Kaspersky, a Russian anti-malware and research firm, released a report documenting a significant campaign to infiltrate banks worldwide to steal hard cash. Somewhere between 300M and 1 billion dollars are estimated to have been pilfered. Attackers entered the banks systems using phishing lures and then…
Here we are in the third week of NCSAM and its time for some Security education!! The whole logic of educating someone is to dispel the myths. Talking to a lot of customers, we discovered that there are some invariably common myths and confusions around the SOX regulations, despite the varied spectrum of industries they…
By Omar Rafik, SolarWinds Senior Manager, Federal Sales Engineering Here’s an interesting article by my colleague Jim Hansen with ideas for engaging agency staff to be part of the solution to security challenges. Insider threats have been a leading cause of breaches for as long as I can remember, and I like Jim’s approach…
By Paul Parker, SolarWinds Federal & National Government Chief Technologist Agencies are becoming far more proactive in their efforts to combat threats, as evidenced by the Department of Defense’s Comply-to-Connect and the Department of Homeland Security’s Continuous Diagnostics and Mitigation programs. To develop and…
It’s October!! STOP. THINK. CONNECT Yes, you are right, it is the National Cyber Security Awareness Month (NCSAM) This year, we are celebrating the 10th anniversary of NCSAM, which is sponsored by the Department of Homeland Security and the National Cyber Security Alliance. With the continuous advancement in technology,…
When it comes to managing your IT security, the first thing that you need to be wary of are the security threats are lurking in your network. Proactive threat management is a must-have in today’s networks, and log files hold the key. Due to the continuous tightening framework of compliance requirements, information…
It looks like you're new here. Sign in or register to get started.