Tag: security

author:

Security

Dominating and Protecting the Connected Battlefield


“Dominance” and “protection” sum up the Defense Department’s goals as U.S. armed forces begin to modernize their networks and communications systems. DOD is investing significant resources in providing troops with highly advanced technology so they can effectively communicate with each other and allies in …


Video

Cloud Spoils Everything


As the leading public cloud platforms, Microsoft Azure and Amazon Web Services (AWS) offer a variety of services. Unfortunately, a handful of “cloud myths” remain as blockers to adoption. In this session, SolarWinds Head Geeks™ Thomas LaRock and Patrick Hubbard, speak with Microsoft Cloud …





Video

SolarWinds Lab Episode 79: Enterprise Security With Threat Monitoring


In this episode, Security Content Architect Destiny Bertucci and Head Geek™ Thomas LaRock, share their knowledge of SolarWinds® Security Event Manager (formerly Log & Event Manager), as well as Threat Monitor. They outline the architecture design for both tools, walk through demos of each, …


author:

Security

Why Investing in Software Security Is Worth It


Building IT software isn’t always the most secure process. The reason for this is simple economics. Companies can’t always afford to build in the security features software needs to be secure. Let’s walk through a typical IT software project. As the IT software project …


author:

Security

Giving SIEM Tools a Role in Your IT Security Operations


While there is no one single solution to guard agencies against all cyberthreats, there are tools that can certainly go a long way toward managing and understanding the cyberthreat landscape. One such tool is Security Information and Event Management (SIEM) software. SIEM tools combine …


author:

Security

Tips for Building a Battle-Hardened Network


The U.S. Army is leading the charge on the military’s multidomain battle concept—but will federal IT networks enable this initiative or inhibit it? The network is critical to the Army’s vision of combining the defense domains of land, air, sea, space and cyberspace to …


author:

Security

The Weakest (Security) Link Might Be You


In the second post in this information security in a hybrid IT world series, let’s cover the best-designed security controls and measures, which are no match for the human element. “Most people don’t come to work to do a bad job” is a sentiment …