Security

Latest Posts in Security

3 Steps Government Employees Can Take to Become Good Cybercitizens

As cyberattacks become more sophisticated across ever-expanding attack surfaces, it’s easy to assume the security team will take care of risk management and mitigation. Indeed, employees—both within the agency and…

The Questions You Should Ask Your Software Providers

Software providers everywhere are under attack by cyber threat actors. Whether it’s a ransomware, the latest zero-day exploit, or a highly sophisticated, well-resourced, and persistent supply chain like SUNBURST, our…

Patch Available for Serv-U Memory Escape Vulnerability

On Friday, July 9, 2021, SolarWinds issued CVE-2021-35211 related to a vulnerability in Serv-U Managed File Transfer Server and Serv-U Secured FTP. We have released a hotfix to resolve this…

Secure by Design | The CISO Perspective

CDW Technology Vice President and Chief Information Security Officer Ruben Chacon, SolarWinds CISO and VP, Security Tim Brown, and SolarWinds Head Geek Thomas LaRock talk about what CISOs need to…

Can They Really See That Data? Auditing Access Controls Across Environments

“Who has access to sensitive financial data in our organization?” Assuming you have a definition of what “sensitive financial data” means for your organization, can you easily answer this question?…

Our Support for Private-Public Partnerships in Combatting Cyberthreats

As a society, so much of everything we do these days revolves around trusted and safe technology designed to make our lives easier and more efficient. The attacks against SolarWinds…

An Investigative Update of the Cyberattack

The recent cyberattacks against SolarWinds, other widely used technology providers, and our respective customers are examples of the ongoing challenges facing the software industry as a whole. It’s clear that…

Security Starts With People, Unfortunately.

One of the findings of our investigations pointed to a compromised account as a possible cause of the cyberoperation. While I was reading the results, I thought, “That could have…

Secure by Design | Securing the Supply Chain — SolarWinds TechPod 039

The recent SUNBURST cyberattack reveals new threats to the supply chains fueling today’s businesses. SolarWinds and FireEye have raised the alarm for leaders everywhere to reexamine their security, to prepare…

Secure by Design | Securing the Software Development Build — SolarWinds TechPod 038

The recent SUNBURST cyberattack on the SolarWinds software build environment is a concerning new reality for the software industry, representing the increasingly sophisticated actions by outside nation-states on the supply…

Tweets

SolarWinds's Twitter avatar
SolarWinds
@solarwinds

Don’t miss out on our presentation session today at 10:20 a.m. (GMT+08:00) by our Partner Kunlan’s Technical Direct… t.co/ynJIAOrSYJ

SolarWinds's Twitter avatar
SolarWinds
@solarwinds

This blog offers 10 recommendations for how to approach SQL Server performance tuning to maximize effort and minimi… t.co/45XgPMYxsB

SolarWinds's Twitter avatar
SolarWinds
@solarwinds

SolarWinds gives data pros the tools for DataOps success with Database Mapper and Task Factory. t.co/ouZywJn2NN