The most recent content from our members.
In the first blog of this series, we became familiar with some well-used cybersecurity terminology. This blog will look at some well-known attack and threat types and how they can be perpetrated. As a couple of readers pointed out, the definition of threat should focus on malicious (or inadvertent) actions on a computer…
Week 4 of NCSAM and its time for some awareness on Cybercrimes!! With the continuous increase of cybercrimes, nearly every enterprise is affected in some way. PricewaterhouseCoopers (PWC) recently conducted a survey on the Cybercrimes in the US. The survey revealed the following: * Organizations are not well-informed about…
Omar Rafik, SolarWinds Senior Manager, Federal Sales Engineering Here’s an interesting article by Mark Hensch about when my colleague Arthur Bradway spoke at a conference about gamifying cybersecurity to improve results. Can gaming significantly improve how governments protect their cybersecurity by making their employees…
By Omar Rafik, SolarWinds Senior Manager, Federal Sales Engineering Here’s an interesting article on the internet of things (IoT) and security threats. We’ve all been expecting IoT devices to be problematic and it’s good to see recognition that better controls are needed for the federal government. The Department of…
By Omar Rafik, SolarWinds Senior Manager, Federal Sales Engineering Here’s an interesting blog about log analytics, one of my favorite topics. Log analytics are fast becoming a critical component of an agency’s monitoring and management infrastructure. The ability to unify log monitoring and log analytics, then aggregate,…
Where are you? Halfway through this 6-part series exploring a new reference model for IT infrastructure security! As you learned in earlier posts, this model breaks the security infrastructure landscape into four domains that each contain six categories. While today’s domain may seem simple, it is an area that I constantly…
By Paul Parker, SolarWinds Federal & National Government Chief Technologist Wary that the Internet of Things (IoT) could be used to introduce unwanted and unchecked security risks into government networks, senators last year created the IoT Cybersecurity Improvement Act of 2017, legislation that placed minimum security…
By Paul Parker, SolarWinds Federal & National Government Chief Technologist Much has been written about aging government IT networks, but not enough attention has been paid to the maturity of those networks. While it’s important for agency IT professionals to modernize legacy networks, it is equally critical for them to…
In this series, we’ve covered some key areas that can help prepare for potential attacks. Preparation is essential. Security policies are essential. Understanding your network and its assets is essential. What happens if a threat is detected? What can we do to monitor for threats? This final blog will look at security…
By Joe Kim, SolarWinds EVP, Engineering and Global CTO Every federal IT pro should be doing standard database auditing, which includes: * Taking a weekly inventory of who accessed the database, as well as other performance and capacity data * Ensuring they receive daily, weekly, and monthly alerts through a…
It looks like you're new here. Sign in or register to get started.