author:


Security

3 Ideas to Build a Better Cybersecurity Strategy

December 24, 2019

Data from the Center for Strategic and International Studies paints a sobering picture of the modern cybersecurity landscape. The CSIS, which has been compiling data on cyberattacks against government agencies since 2006, found the United States has been far and away the top victim …


author:


Systems

A POwerful SHortcut to Automating Operations

December 23, 2019

A few years back I was working at a SaaS provider when we had an internal hackathon. The guidelines were simple: As part of your project you had to learn something, and you had to choose a framework/methodology beneficial to the organization. I was …


author:


Database

Thoughts on the VividCortex Acquisition

December 20, 2019

I visited the Austin office this past week, my last trip to SolarWinds HQ for 2019. It’s always fun to visit Austin and eat my weight in pork products, but this week was better than most. I took part in deep conversations around our …


author:


Applications

Say Kubernetes One More Time, I Dare You

December 20, 2019

Introduction OK, so the title is hardly original, apologies. But it does highlight the buzz for Kubernetes still out there not showing any signs of going away anytime soon. Let’s start with a description of what Kubernetes is: Kubernetes is a portable, extensible, open-source …



author:


ITSM

5 IT Service Management Resolutions for 2020

December 19, 2019

For many, New Year’s resolutions emphasize a fresh start and becoming better versions of themselves; adopting a healthier lifestyle, being more organized, starting a business, starting a family. The list of resolutions is infinite. But how are organizations preparing for the new year? It’s …


author:


Networks

Unplanned Obsolescence

December 18, 2019

As we head into the new year, people will once again start quoting a popular list describing the things kids starting college in 2020 will never personally experience. Examples of these are things like “They’re the first generation for whom a ‘phone’ has been …


author:


Security

Using User Access Management to Defend Against Insider Threats

December 17, 2019

According to the SolarWinds 2019 Cybersecurity Survey, cybersecurity threats are increasing—particularly the threat of accidental data exposure from people inside the agency. According to the survey, 56% of respondents said the greatest source of security threats to federal agencies is careless and/or untrained agency …


author:


Podcast

SolarWinds TechPod—[De]Constructing Cloud With Mike Pfeiffer—Episode 021

December 17, 2019

This episode of SolarWinds® TechPod™ is brought to you by the SolarWinds APM Suite. Simplify your full-stack monitoring for hybrid, Azure, AWS, and other cloud-native IT environments, and gain valuable performance insights across user experience, applications, services, and infrastructure. Visit https://www.solarwinds.com/apmsuite.  On this episode of SolarWinds TechPod, our host …