Tag: cyber security


author:

Security

Information Security: Defense-in-Depth Style

July 15, 2019

Ladies and gentlemen, we’ve reached the fifth and final post of this information security in hybrid IT series. I hope you’ve found as much value in these posts as I have in your thoughtful comments. Thanks for following along. Let’s take a quick look back at …


author:

Security

The Weakest (Security) Link Might Be You

June 3, 2019

In the second post in this information security in a hybrid IT world series, let’s cover the best-designed security controls and measures, which are no match for the human element. “Most people don’t come to work to do a bad job” is a sentiment …



author:

Security

Help Protect Your Company From a Data Breach

April 10, 2019

It’s likely no surprise to anyone that the amount of data collected, stored, and analyzed continues to grow exponentially across the globe. From a security perspective, it’s always important to minimize the amount and sensitivity of data stored, but the reality is, if the …


Video

SolarWinds Lab Episode 74: Security Tools to Fit Today’s Threats

March 15, 2019

In this episode, Head Geeks™ Destiny Bertucci and Thomas LaRock will show you how to ward off security dangers using SolarWinds software. See how SQL injection can be rooted out and how access rights compliance is a headache of the past. All while using Security Event …


Podcast Security

Steps to Proactive Cybersecurity—SolarWinds TechPod 006

March 14, 2019

Ready to implement or expand a successful security  program for your customers? In this episode of SolarWinds TechPod, SolarWinds VP of security Tim Brown and senior channel sales specialist Stefanie Hammond discuss the steps you can take. Related Links: 10 Steps To Proactive Security …



author:

Security

7 Steps to Build an Effective Cyberincident Response Process

March 6, 2019

As an IT security professional, you work hard to prevent cyberattacks. You patch your systems regularly, update antivirus libraries, run user trainings, and lock down user access to sensitive systems and data. You’re the poster child for solid cyberhygiene. Despite all the money you …



1

2