Security

Latest Posts in Security

SolarWinds Aims to Set New Standard in Software Development With Next-Generation Build System

At SolarWinds, we believe security should be a core competency of all organizations. The December 2020 SUNBURST cyberattack on the SolarWinds software build environment emphasized a concerning new reality for…

SHIELDS UP: CISA Guidance for Cybersecurity

As the world sends its support to the people of Ukraine in this time of unrest and uncertainty, the evolving conditions in the region raise the alert for the entire…

Security Apathy Is Real – Here Are 5 Ways Agencies Can Combat It

A new study—the SolarWinds IT Trends Report 2021—suggests, although tech pros are confident with their work from home and remote work policies, agencies are at a critical inflection point as this…

Three Preventative Strategies to Help Mitigate Asset Risk in Your Agency

For many federal employees, the workplace has shifted from a traditional office setting to being at home—in a kitchen, bedroom, basement, or any spare desk in the house. With a…

How Automation Takes the Time and Guesswork Out of Security Compliance

As this fiscal year wraps up, many agencies are planning their response to compliance reporting requirements. Meeting these requirements—particularly in advance of an audit—can be incredibly time-consuming. While the Defense…

U.S. Government Issues Advisory Against Common Cyber Threats During the Holidays

In advance of this week’s Thanksgiving holiday in the U.S., the U.S. Cybersecurity & Infrastructure Agency (CISA) and the Federal Bureau of Investigation (FBI) issued a reminder for critical infrastructure…

Register for Building Ahead: Cybersecurity Washington Post Live

With the Biden administration considering the enhancement of national cybersecurity a top priority, learnings from the sophisticated attack on SolarWinds help highlight the need to collectively improve the prevention, management,…

3 Steps Government Employees Can Take to Become Good Cybercitizens

As cyberattacks become more sophisticated across ever-expanding attack surfaces, it’s easy to assume the security team will take care of risk management and mitigation. Indeed, employees—both within the agency and…

The Questions You Should Ask Your Software Providers

Software providers everywhere are under attack by cyber threat actors. Whether it’s a ransomware, the latest zero-day exploit, or a highly sophisticated, well-resourced, and persistent supply chain like SUNBURST, our…

Lesley Carhart on Cybersecurity, IT Careers, and Service In and Out of the Military — SolarWinds TechPod 048

Lesley Carhart is recognized as one of the leading voices in digital forensics and cybersecurity. But her career began – and is still firmly rooted – with her service in the Guard and Reserves. She…

Tweets

SolarWinds's Twitter avatar
SolarWinds
@solarwinds

Join this presentation by Brandon Tucker, and gain a better understanding of the HADR types to analyze the right so… t.co/XwzclEWKy2

SolarWinds's Twitter avatar
SolarWinds
@solarwinds

@ValerieRivir 🤗

SolarWinds's Twitter avatar
SolarWinds
@solarwinds

The free eBook “DevOps for the Database” highlights how effective DevOps practices can help to optimize database pe… t.co/JhuYSlRfQB