Security

Latest Posts in Security

Who Protects the Protectors?

Remember the person in my last post who asked me to describe a load balancer? They came back and asked about ASAs. I’m not sure if they really wanted to…

Cloud Native Operational Solutions – Malware Prevention Management

Malware prevention is a very hot topic due to the recent ransomware attacks that have completely crippled several companies and organizations. For most smaller companies, being able to hire a…

5 Strategies for Security and Operations Success

Hybrid IT presents SecOps challenges   The Department of Defense (DoD) has long been at the tip of the spear when it comes to successfully melding IT security and operations…

Balancing Stability and Agility

“The price of reliability is the pursuit of the utmost simplicity.” C.A.R. Hoare, Turing Award lecture.   Software and computers in general are inherently dynamic and not of a state…

I Beat Them to Firing Me! Part Two: Fight Back

How to use network configuration, change, and compliance management (NCCCM) and other monitoring software in response to an actual security breach. If you have not read part one, I would suggest that…

I Beat Them to Firing Me: A Story of Corporate Sabotage

Why network configuration, change, and compliance management (NCCCM) is a must Inspired by former Citibank employee sentencing We’ve all heard horror stories about the disgruntled employee who pillages the office supply…

5 Fundamental Strategies for Cybersecurity

Here’s an interesting article from my colleague Joe Kim, in which he offers suggestions to reduce cybersecurity vulnerabilities. Agencies should focus on the basics to protect against attacks The government’s…

Windows Workstation Logs – Integration

In the final blog of this series, we’ll look at ways to integrate Windows event logs with other telemetry sources to provide a complete picture of a network environment. The…

Microsoft Workstation Logs – Configuration

Over the last three posts, we’ve looked at Microsoft event logging use cases and identified a set of must-have event IDs. Now we’re ready to put our security policy in…

Building a Solid Security Foundation to Support the NIST Framework

Last year, the White House issued an Executive Order designed to strengthen cybersecurity efforts within federal agencies. The EO requires agencies to adhere to the National Institute of Standards and…

Tweets

SolarWinds's Twitter avatar
SolarWinds
@solarwinds

@AGarejo Hello, We are working towards releasing Orion 2020.2.4 and appreciate the patience of you and all our cust… t.co/x4lwFQFsU4

SolarWinds's Twitter avatar
SolarWinds
@solarwinds

@DrPayload Hello, Thanks for reaching out. Please send us a DM with your contact info and we'll have someone get in… t.co/CvxmQO6hxN

SolarWinds's Twitter avatar
SolarWinds
@solarwinds

As the role of the #ITPro continues to evolve, what are the top skills needed? Find out in this article. t.co/bDhW4DmaoR