Security

Latest Posts in Security

Landing on a Secure File Sharing Solution

Back in October, I wrote about Shadow IT and how some users are turning to popular file sharing applications like Dropbox, OneDrive, and Google Drive to get their work done…

5 More Ways I Can Steal Your Data: Hire People Who Lack Empathy

In this last post of my 5 More Ways I Can Steal Your Data series, I focus on my belief that all data security comes down to empathy. Yes, that…

Non-IT File Sharing and HIPAA Implications

When I first considered writing this post about possible HIPAA violations, I could clearly imagine how non-IT compliant file sharing could cause issues with HIPAA compliance. It wasn’t until I…

The Business Challenges We See Today

Over the next few weeks, I will be releasing a series of articles covering the value of data analytics and insight, focusing on five of the key business drivers that…

5 More Ways I Can Steal Your Data: Ask the Security Guard to Help Me Carry it Out

In my recent post  5 More Ways I Can Steal Your Data – Work for You & Stop Working for You I started telling the story of a security guard…

Needle In a Hay Stack or Sword in a Straw Pile?

I’ve spent countless hours trying to find the perfect tool for the job. In fact, I’ve spent more hours searching at times than I have doing the work. You’ve probably…

How We Encrypt Data in MySQL With Go

A SaaS product needs to use security measures you might not ordinarily use in an on-premises solution. In particular, it’s important for all sensitive data to be secured. Encryption plays…

Is Threat Intelligence For Me?

“Intelligence is the ability to adapt to change.” –Stephen Hawking Search for the term “threat intelligence” and you’ll get 12.3 million hits. Not all of them are relevant to cyber,…

All Data is Not Created Equal

“Horizontal expansion loses the depth, though excessive depth that only provokes darkness is futile. Therefore a balance between depth and vastness is essential in learning” ― Privavrat Thareia This year, consider…

How to Prevent a Data Breach from SQL Injection Attacks

The average total cost of a data breach right now is $3.79 million, according to the 2015 Cost of Data Breach Study: Global Analysis. Cyber attacks are one of the top…

Tweets

SolarWinds's Twitter avatar
SolarWinds
@solarwinds

SolarWinds Observability is driving business value in complex IT environments. Read the full article here: t.co/uc629KUAp7

SolarWinds's Twitter avatar
SolarWinds
@solarwinds

Automated analytics and actionable insights are within reach with SolarWinds Hybrid Cloud Observability. Experience… t.co/6YVq1Wr2A3

SolarWinds's Twitter avatar
SolarWinds
@solarwinds

Global Security Mag covers SolarWinds Next-Generation Build System t.co/aHry6ncSOf