Tag: cybersecurity

Podcast

Steps to Proactive Cybersecurity — SolarWinds TechPod 006


Ready to implement or expand a successful security program for your customers? In this episode of SolarWinds TechPod, SolarWinds VP of security Tim Brown and senior channel sales specialist Stefanie Hammond discuss the steps you can take. Related Links: 10 Steps To Proactive Security …


Podcast

Security Threats and Cyber Hygiene — SolarWinds TechPod 005


In this episode of SolarWinds TechPod, Tech Talks, host Alex Navarro discusses security threats, the importance of practicing good cyber hygiene, and best practices for managing users and their devices with Mav Turner, Denny LeCompte, and Jim Hansen of SolarWinds. Related Links: SolarWinds Access …



author:

Security

Moving Toward More Proactive Cybersecurity


As the cyberlandscape continues to evolve, so do the methods of attack used by cybercriminals. And it isn’t just outsiders you have to worry about; insiders can be responsible for data breaches too. Given all the moving pieces, it’s no wonder the state of …


author:

Security

Three SIEM Must-Haves


Many businesses need to increase their security game. You can put all the preventive measures in place that you want—like patching, antivirus, mail protection, and firewalls—yet threats can still slip past defenses. According to the recent Ponemon 2018 Cost of a Data Breach report, …



Security

You Are Here – Visibility & Control


Today, in the fifth post of this six-part series, we’re going to cover the fourth and final domain of our reference model for IT infrastructure security. Not only is this the last domain in the model, it is one of the most exciting. As …



author:

Security

Security Monitoring – It’s All About the Data


In this series, we’ve covered some key areas that can help prepare for potential attacks. Preparation is essential. Security policies are essential. Understanding your network and its assets is essential. What happens if a threat is detected? What can we do to monitor for …


author:

Security

Protection Methods – The Art of Data Analytics


The previous blog reviewed some guidelines that laid the foundation for security through understanding your environment and planning how elements within that environment are configured, used, accessed, and tracked. Although implementing these recommended best practices won’t make you impervious to all attacks, the concept …


1

2