Jim Hansen is the vice president of products, application management, at SolarWinds, bringing over 20 years of experience building and delivering simple and easy-to-use software solutions. Jim is passionate about customers, understanding their needs, and delivering solutions that make their jobs easier and their infrastructures easier to manage and secure. He joined SolarWinds in August 2018 to help build the security portfolio, and has since been focused on growing the application management business—designed to help IT professionals and developers manage and monitor the health and performance of their application infrastructures.

author:

Security

How Security Leaders Might Minimize Human Error

October 8, 2019

A recent federal cybersecurity survey by SolarWinds found federal IT professionals feel threats posed by careless or malicious insiders or foreign governments are at an all-time high. Worse, hackers aren’t necessarily doing technical gymnastics to navigate through firewalls or network defenses. Instead, they’re favoring …


author:

Security

Assessing the Navy’s New Cybersecurity Program

September 24, 2019

The Navy’s new Combat to Connect in 24 Hours (C2C24) is an ambitious program with the potential to change naval warfare as we know it. The program is designed to improve operational efficiency by automating the Navy’s risk management framework (RMF) efforts; providing sailors …


author:

Security

2 Key Assets in the Government’s Cybersecurity Battle (Part II)

August 27, 2019

Read part one here. Technology: Providing the Necessary Visibility Cybersecurity personnel can’t succeed without the proper tools, but many of them don’t have the technology necessary to protect their agencies. According to the Federal Cybersecurity Risk Determination Report and Action Plan, 38% of federal …


author:

Security

2 Key Assets in the Government’s Cybersecurity Battle (Part I)

August 20, 2019

The Trump administration issued two significant reports in the last couple of months attesting to the state of the federal government’s cybersecurity posture. The Federal Cybersecurity Risk Determination Report and Action Plan noted 74% of agencies that participated in the Office of Management and …


author:

Security

Making Every Agency Employee a Security Advocate

July 30, 2019

The rising numbers of data breaches should come as no surprise to federal IT security pros who work every day to ensure agency information is secure. However, these breaches may not be something a federal IT team can prevent on its own. According to …


author:

Security

Giving SIEM Tools a Role in Your IT Security Operations

July 16, 2019

While there is no one single solution to guard agencies against all cyberthreats, there are tools that can certainly go a long way toward managing and understanding the cyberthreat landscape. One such tool is Security Information and Event Management (SIEM) software. SIEM tools combine …


author:

Security

Neglect These Cybersecurity Fundamentals at Your Peril

May 8, 2019

“Shiny object syndrome” exists within both the IT and cybersecurity fields. The press loves to focus on the sleekest new security toys or the latest threat-hunting technique. After all, red-team/blue-team simulations and advanced threat hunting sound cool and impress at networking events. However, for …


author:

Security

7 Steps to Build an Effective Cyberincident Response Process

March 6, 2019

As an IT security professional, you work hard to prevent cyberattacks. You patch your systems regularly, update antivirus libraries, run user trainings, and lock down user access to sensitive systems and data. You’re the poster child for solid cyberhygiene. Despite all the money you …


author:

Security

A Frank Discussion of Multifactor Authentication

February 20, 2019

Someone steals credentials from one of your client’s executives. They guess the username and password to their email account. From there, the cybercriminal can send out targeted phishing emails to compromise even more accounts or trick employees into handing over sensitive data. To combat …