access rights

Tag: access rights

3 Reasons You Should Start With Access Rights Management Over Access Management

Inevitably, at some point in the evolution of your security strategy, you realize you need to put some controls around access. For far too long, organizations have allowed users to…

Three Steps to Improve Identity and Access Management Without Undermining Productivity

Today’s government IT professionals set rules to provide users with access rights, improving workflows while protecting agencies against threats. Unfortunately, the prevalence of mobile devices and cloud-based applications has made…

CSAM: Surprising Truths about Compliance and Security

In our final post for Cybersecurity Awareness Month, Tim Brown looks at the growing trend of industry-agnostic compliance laws and the relationship between compliance and security. Compliance laws often drive…

Who Moved My Active Directory?

Active Directory is the backbone to so many things that run your business. But recent years have brought significant change to this once predictable and reliable tool. As your infrastructure…

CSAM: Safeguarding Clients Against Insider Betrayals (and Mistakes)

In the second part of our National Cybersecurity Awareness Month series, Colin Knox offers two key tips to help you prevent insider attacks and police data and systems access. We’re…

Assessing the Navy’s New Cybersecurity Program

The Navy’s new Combat to Connect in 24 Hours (C2C24) is an ambitious program with the potential to change naval warfare as we know it. The program is designed to…

When “Trust but Verify” Isn’t Enough: Life in a Zero Trust World

Welcome to the first in a five-part series focusing on information security in a hybrid IT world. Because I’ve spent the vast majority of my IT career as a contractor…

Get Off the Sidelines With a Proactive Security Solution

The pace of cybersecurity is moving faster than ever, and IT pros have to stay ahead of the game if they hope to stay ahead of hackers. Unfortunately, many organizations…

Security Theater, Shadow IT, and Insider Threats—SolarWinds TechPod 009

Host Alex Navarro is joined by two VPs of product strategy, Mav Turner and Brandon Shopp, to discuss which security issues, solutions, and strategies are trending topics of conversation at this year’s…

SolarWinds Lab Episode 74: Security Tools to Fit Today’s Threats

In this episode, Head Geeks™ Destiny Bertucci and Thomas LaRock will show you how to ward off security dangers using SolarWinds software. See how SQL injection can be rooted out and how…