cybersecurity

Tag: cybersecurity

You Are Here – Making Sense of Modern InfoSec

Now that we all carry supercomputers complete with real-time GPS mapping in our pockets, a reference to physical maps may feel a bit antiquated. You know the ones I’m talking…

Security Monitoring – It’s All About the Data

In this series, we’ve covered some key areas that can help prepare for potential attacks. Preparation is essential. Security policies are essential. Understanding your network and its assets is essential.…

Protection Methods – The Art of Data Analytics

The previous blog reviewed some guidelines that laid the foundation for security through understanding your environment and planning how elements within that environment are configured, used, accessed, and tracked. Although…

Policy and Controls – A Foundation for Threat Protection

In the previous blog in this series, we reviewed several types of attacks and threats, and some ways they are perpetrated. In this blog, we will become familiar with several…

Cybersecurity Fundamentals – Attack Surfaces and Vulnerabilities

In the first blog of this series, we became familiar with some well-used cybersecurity terminology. This blog will look at some well-known cyberattack and threat types and how they can…

Cybersecurity Fundamentals – Threat and Attack Terminology

In the first post of this blog series, we’ll cover the fundamentals of cybersecurity, and understanding basic terminology so you can feel comfortable “talking the talk.” Over the next few…

AI Should Not Replace Established Security Practices

Here is an interesting article from my colleague Joe Kim, in which he discusses the impact of artificial intelligence on cybersecurity.   Agencies are turning to artificial intelligence (AI) and…

Who Protects the Protectors?

Remember the person in my last post who asked me to describe a load balancer? They came back and asked about ASAs. I’m not sure if they really wanted to…

SolarWinds Lab Episode 51: Breaking up with Bad Habits: Monitoring Security and Orion Don’ts

In this episode, Destiny Bertucci and Patrick Hubbard cover the best ways to manage your monitoring system based on scalability and performance. Learn how to create and maintain a security…

SolarWinds Lab Episode 27: You’ve Already Been Hacked! Now What?

Good security practices are on every experienced IT pro’s daily to-do list. But what can you do if security is being breached right now? The answer is: plenty! In this…