Tag: risk management

Podcast Security

Assessing Risk – The Key to IT Security—SolarWinds TechPod 023

February 18, 2020

When it comes to IT security, it can feel overwhelming. What needs securing and at what level? How do you prioritize? But when considering risk, this is very different conversation. Changing the conversation from security to risk helps shape an informed and balanced approach. Tim Brown discusses how to apply a risk-based model …



Better Visibility Can Help Improve Your FITARA scores

October 29, 2019

The most recent version of the scorecard measuring agency implementation of the Federal IT Acquisition Reform Act gave agencies cause for both celebration and concern. On the whole, scores in December’s FITARA Scorecard 7.0 rose, but some agencies keep earning low scores. Agencies don’t …



6 Risk Management Best Practices You Can Implement Today

August 29, 2019

Understanding risk management (and why it’s important) as I highlighted in my last post, Why Risk Management Is Critical to Your IT Infrastructure, is essential as you begin to plan a course of action. In this post, we’ll continue to explore risk management, and …



Why Risk Management Is Critical to Your IT Infrastructure

August 23, 2019

Picture this. It’s late 2006, we’re on the verge of the 2008 economic collapse in the United States, and an investment bank makes a strategic move. Their data models show unexpected losses for two weeks, and a decision is made to hedge their subprime …



The Story Patching Tells

June 14, 2019

In post #3 of this information security series, let’s cover one of the essential components in an organization’s defense strategy: their approach to patching systems. Everywhere an Attack When did you NOT see a ransomware attack or security breach story in the news? And …


You Are Here – Perimeter Security

October 18, 2018

In part 1 of this series, we covered some of the most prevalent and most promising cybersecurity models and frameworks available today. These are all tools that can help you determine the size and shape of the current information security landscape, and where you …