The most recent content from our members.
Where are you? Halfway through this 6-part series exploring a new reference model for IT infrastructure security! As you learned in earlier posts, this model breaks the security infrastructure landscape into four domains that each contain six categories. While today’s domain may seem simple, it is an area that I constantly…
1. What Identity Management systems does SolarWinds WebHelpdesk integrate with? 2. Which of the following activities are supported by SolarWinds WebHelpdesk? • Provisioning • De-provisioning • Authentication • Authorisation • Federation 3. Do published API’s to integrate with the relevant Identity Management system exist?…
By Joe Kim, SolarWinds EVP, Engineering & Global CTO Last year, in SolarWinds’ annual cybersecurity survey of federal IT managers, respondents listed “careless and untrained insiders” as a top cybersecurity threat, tying “foreign governments” at 48 percent. External threats may be more sensational, but for many federal…
Network Access of Old I remember back in the days when I worked at the phone company. We had a security desk right inside the door and at the counter was a desktop that had the company directory on it. What didn’t make a lot of sense to me was that the Ethernet port was on the front of the wall, not behind the counter.…
It looks like you're new here. Sign in or register to get started.