Security

Latest Posts in Security

Account Takeover IS Your Problem — SolarWinds TechPod 020

Phishing and malware are scary enough, but the number one tactic used by bad actors to get access to and take over accounts is something different: using compromised credentials. Why?…

CSAM: Don’t Miss These Commonly Overlooked Areas of Cybersecurity

Security isn’t just about the latest technical controls or the newest threat. Rani Johnson talks about two areas of security she thinks should get more emphasis. If you walk the…

The Do’s and Don’ts of Edge Computing

Edge computing is here to stay and it’s no wonder. Edge computing provides federal IT pros with a range of advantages they simply don’t have with more traditional computing environments.…

National Cybersecurity Awareness Month—Remedies for Today’s Common Threats

In our third Cybersecurity Awareness Month blog, Thomas LaRock explains how good backup and email protection could help save your bacon if the worst happens. An executive at your company…

Leveraging Key Strategies from Cybersecurity Frameworks to Improve Security

Over the past few years, several critical cybersecurity frameworks have been introduced to help agency IT professionals detect and deter stealthy intruders. These include the Cyber Threat Framework (CTF), the…

CSAM: Safeguarding Clients Against Insider Betrayals (and Mistakes)

In the second part of our National Cybersecurity Awareness Month series, Colin Knox offers two key tips to help you prevent insider attacks and police data and systems access. We’re…

Maintaining a Secure Environment: Monitoring Beyond the Log File

This blog series has been all about taking a big step back and reviewing your ecosystem. What do you need to achieve? What are the organization’s goals and mandates? What…

How Security Leaders Might Minimize Human Error

A recent federal cybersecurity survey by SolarWinds found federal IT professionals feel threats posed by careless or malicious insiders or foreign governments are at an all-time high. Worse, hackers aren’t…

Two Critical Security Tips to Kick Off National Cybersecurity Awareness Month

Brandon Shopp expands on his two tips for National Cybersecurity Awareness Month to help you provide the best security support you can to your users. On October 31, we’ll celebrate…

Assessing the Navy’s New Cybersecurity Program

The Navy’s new Combat to Connect in 24 Hours (C2C24) is an ambitious program with the potential to change naval warfare as we know it. The program is designed to…