The most recent content from our members.
As organizations expand across industries and regions, they face a complex web of regulations and a constantly shifting threat landscape. The consequences of non-compliance can be severe, including legal penalties, financial losses, reputational damage, and operational disruptions. So, how can businesses stay ahead of…
When it comes to IT security, it can feel overwhelming. What needs securing and at what level? How do you prioritize? But when considering risk, this is very different conversation. Changing the conversation from security to risk helps shape an informed and balanced approach. Tim Brown discusses how to apply a risk-based…
In Risk Management you have 4 risks it detects. Every detected computer is added to the specific risk. As example if a computer does not have an antivirus installed it will create a risk. If another is detected it is shown in same risk. When we want to assign these risks to our engineers we are able to create one incident…
The U.K. public sector holds some of the most important and sensitive data in the country, from private medical records to military intelligence. Consistently protecting this data is a major priority, which means the IT teams working within the public sector are entrusted with implementing the most effective security…
Omar Rafik, SolarWinds Senior Manager, Federal Sales Engineering Here’s an interesting article by my colleague Mav Turner with suggestions on improving your agency’s FITARA score. FITARA rolls up scores from other requirements and serves to provide a holistic view of agency performance. The most recent version of the…
In post #3 of this information security series, let's cover one of the essential components in an organization's defense strategy: their approach to patching systems. Everywhere an Attack When did you NOT see a ransomware attack or security breach story in the news? And when was weak patching not cited as one of the…
In part 1 of this series we covered some of the most prevalent and most promising cybersecurity models and frameworks available today. These are all tools that can help you determine the size and shape of the current information security landscape, and where you and your organization are within it. We also realized that…
Now that we all carry supercomputers complete with real-time GPS mapping in our pockets, a reference to physical maps may feel a bit antiquated. You know the ones I’m talking about; you can still find them at many malls or theme parks, and even some downtown city streets. It’s usually a backlit map on a pillar with a…
By Paul Parker, SolarWinds Federal & National Government Chief Technologist There is so much involved in improving agency performance that it can be difficult to pinpoint one thing—to make one recommendation—as a starting point toward performance enhancement. That said, technology plays an enormous role, according to the…
Security tools: sometimes it seems that we never have enough to keep up with the task of protecting the enterprise. Or, at least it seems that way when walking the exhibit floor at most technology conferences. There’s a veritable smorgasbord of tools available, and you could easily spend your entire day looking for the…
It looks like you're new here. Sign in or register to get started.