Tag: security planning

author:

Security

Breach Data Trends: October 2019 to March 2020

May 6, 2020

Most of us have no idea if our credentials are out in the wild, for bad actors to take and use for malicious intent. Unfortunately, they often are. Since October 8, 2019, research from SpyCloud—our partner in delivering Identity Monitor—has uncovered over 630 million …



author:

Security

2 Key Assets in the Government’s Cybersecurity Battle (Part I)

August 20, 2019

The Trump administration issued two significant reports in the last couple of months attesting to the state of the federal government’s cybersecurity posture. The Federal Cybersecurity Risk Determination Report and Action Plan noted 74% of agencies that participated in the Office of Management and …



Video

SolarWinds Lab Episode 79: Enterprise Security With Threat Monitoring

August 16, 2019

In this episode, Security Content Architect Destiny Bertucci and Head Geek™ Thomas LaRock, share their knowledge of SolarWinds® Security Event Manager (formerly Log & Event Manager), as well as Threat Monitor. They outline the architecture design for both tools, walk through demos of each, …


author:

Security

Why Investing in Software Security Is Worth It

July 18, 2019

Building IT software isn’t always the most secure process. The reason for this is simple economics. Companies can’t always afford to build in the security features software needs to be secure. Let’s walk through a typical IT software project. As the IT software project …



author:

Security

Neglect These Cybersecurity Fundamentals at Your Peril

May 8, 2019

“Shiny object syndrome” exists within both the IT and cybersecurity fields. The press loves to focus on the sleekest new security toys or the latest threat-hunting technique. After all, red-team/blue-team simulations and advanced threat hunting sound cool and impress at networking events. However, for …


Video

SolarWinds Lab Episode 74: Security Tools to Fit Today’s Threats

March 15, 2019

In this episode, Head Geeks™ Destiny Bertucci and Thomas LaRock will show you how to ward off security dangers using SolarWinds software. See how SQL injection can be rooted out and how access rights compliance is a headache of the past. All while using Security Event …


author:

Security

7 Steps to Build an Effective Cyberincident Response Process

March 6, 2019

As an IT security professional, you work hard to prevent cyberattacks. You patch your systems regularly, update antivirus libraries, run user trainings, and lock down user access to sensitive systems and data. You’re the poster child for solid cyberhygiene. Despite all the money you …