Security

Latest Posts in Security

Three Ways a Proactive Defense Strategy Can Prevent Cyberattacks

Schools and local municipalities have always been vulnerable to cyberattacks, but in recent years, especially since the pandemic’s beginning, they have been increasingly more prone to threats. According to a…

Three Critical Questions for Healthcare

Why Should Healthcare Bother With IT? Healthcare has always been people-centric—so should IT even be a consideration when the real issue is people? Before the pandemic, healthcare was already experiencing…

SHIELDS UP: CISA Guidance for Cybersecurity

As the world sends its support to the people of Ukraine in this time of unrest and uncertainty, the evolving conditions in the region raise the alert for the entire…

Security Apathy Is Real – Here Are 5 Ways Agencies Can Combat It

A new study—the SolarWinds IT Trends Report 2021—suggests, although tech pros are confident with their work from home and remote work policies, agencies are at a critical inflection point as this…

Three Preventative Strategies to Help Mitigate Asset Risk in Your Agency

For many federal employees, the workplace has shifted from a traditional office setting to being at home—in a kitchen, bedroom, basement, or any spare desk in the house. With a…

How Automation Takes the Time and Guesswork Out of Security Compliance

As this fiscal year wraps up, many agencies are planning their response to compliance reporting requirements. Meeting these requirements—particularly in advance of an audit—can be incredibly time-consuming. While the Defense…

U.S. Government Issues Advisory Against Common Cyber Threats During the Holidays

In advance of this week’s Thanksgiving holiday in the U.S., the U.S. Cybersecurity & Infrastructure Agency (CISA) and the Federal Bureau of Investigation (FBI) issued a reminder for critical infrastructure…

Register for Building Ahead: Cybersecurity Washington Post Live

With the Biden administration considering the enhancement of national cybersecurity a top priority, learnings from the sophisticated attack on SolarWinds help highlight the need to collectively improve the prevention, management,…

3 Steps Government Employees Can Take to Become Good Cybercitizens

As cyberattacks become more sophisticated across ever-expanding attack surfaces, it’s easy to assume the security team will take care of risk management and mitigation. Indeed, employees—both within the agency and…

The Questions You Should Ask Your Software Providers

Software providers everywhere are under attack by cyber threat actors. Whether it’s a ransomware, the latest zero-day exploit, or a highly sophisticated, well-resourced, and persistent supply chain like SUNBURST, our…

Tweets

SolarWinds's Twitter avatar
SolarWinds
@solarwinds

Check out the essential guide to digital transformation on @itbriefasia: t.co/ZAPC0qLXAg

SolarWinds's Twitter avatar
SolarWinds
@solarwinds

Webhooks can collect real-time data in a more productive way than API polling. Learn more about webhook utilization… t.co/kXUogA7OQ1

SolarWinds's Twitter avatar
SolarWinds
@solarwinds

@SQLEspresso It looked like a great time! 🎤