Security

Latest Posts in Security

How to Monitor, Manage, and Secure Active Directory

Microsoft Active Directory (AD) is the nerve center enabling your federal agency to access the systems and applications staff members need to do their jobs. AD is also a high-risk…

Tips for National Cybersecurity Awareness Month

October is an interesting month. It ends with Halloween and comes with 30 more days filled of cybersecurity. In fact, each year October is “National Cybersecurity Awareness Month” in the…

Don’t Let Cyberattacks Derail Your Digital Transformation Journey

Many organizations across the U.K. are tackling the three main factors behind digital transformation: cloud technology, IoT, and employee mobility. However, one downside to increased digitization is how this opens…

Three Ways Agencies Can Improve Cloud Security and Performance

The Federal Cloud Computing Strategy (FCCS) makes it clear government agencies have significant responsibilities for protecting cloud-hosted data. The FCCS states the need for agencies to develop their own governance…

Proactive Security Strategy for the Public Sector (10 Steps, Part Two)

In the first of these two articles, we covered the first five steps public sector organizations should take to change how they think about their cybersecurity to overcome this challenge.…

Proactive Security Strategy for the Public Sector (10 Steps, Part One)

The U.K. public sector holds some of the most important and sensitive data in the country, from private medical records to military intelligence. Consistently protecting this data is a major…

How Can the Public Sector Get Remote Working Right?

Mobile working is becoming the reality for an increasing number of public sector staff. But the threat and impact brought by the coronavirus COVID-19 outbreak has seen many organizations instructing…

Security Operations and IT Operations—Better Together—SolarWinds TechPod 030

Security operations and IT operations have a lot of differences, but more similarities than you may think, especially as their worlds are merging more quickly than ever before. This presentation will delve into research driven…

Beyond the EHR: 3 Other Places Healthcare Organizations Need to Watch to Ensure HIPAA Compliance

With the state of the world today, healthcare facilities of all kinds and sizes are operating under a state of distress. Employees are working on the frontlines, while also having…

Protecting Patient Data Through Strict Access Rights Management

The healthcare ecosystem is complex, and the diversity of the different departments and devices results in a multifaceted IT infrastructure that can be hard to manage. With increasing digitalization, healthcare…

Tweets

SolarWinds's Twitter avatar
SolarWinds
@solarwinds

Not enough event details with #Ruby puts but the built-in logger is too chatty? Find the #LogManagement sweet spot… t.co/lCtaC0OnP8

SolarWinds's Twitter avatar
SolarWinds
@solarwinds

Learn how the #ServiceDesk can become a more central resource for employee tech requests in this @VMBlog article. t.co/m2o1eMOaDX

SolarWinds's Twitter avatar
SolarWinds
@solarwinds

As employees continue to work more distributed than ever before, the expectations for business applications has nev… t.co/lwd32U6TUf