security

Tag: security

Breach Data Trends: October 2019 to March 2020

Most of us have no idea if our credentials are out in the wild, for bad actors to take and use for malicious intent. Unfortunately, they often are. Since October…

Solving the Contractor Breach Challenge

Federal IT pros are having more success tackling cybersecurity challenges within their agencies. However, there’s still much work to be done when it comes to solving the security challenges posed…

Assessing Risk – The Key to IT Security — SolarWinds TechPod 023

When it comes to IT security, it can feel overwhelming. What needs securing and at what level? How do you prioritize? But when considering risk, this is very different conversation.…

New Laws Alone Won’t Be Enough to Secure IoT Devices

Security concerns over the Internet of Things (IoT) are growing, and federal and state lawmakers are taking action. First, the U.S. Senate introduced the Internet of Things Cybersecurity Improvement Act…

Three Ways the Department of Defense Can Plug Security Holes

An early 2019 report from the Defense Department Officer of Inspector General revealed how difficult it’s been for federal agencies to stem the tide of cybersecurity threats. Although the DoD…

Modernizing Security to Protect Next-Generation Federal Networks

As agencies across the federal government modernize their networks to include and accommodate the newest technologies such as cloud and the Internet of Things (IoT), federal IT professionals are faced…

Federal IT Pros Optimistic About Security, but Insider Threats Remain a Challenge

Federal IT professionals feel threats posed by careless or malicious insiders and foreign governments are at an all-time high, yet network administrators and security managers feel like they’re in a…

Quicker Azure Monitoring, Linux Change Detection, New API Poller – SolarWinds Lab #82 (Part 2)

The first step in improving system monitoring and visibility is getting data flowing sooner rather than later. For systems engineers managing diverse resources, it can be easier said than done.…

Dominating and Protecting the Connected Battlefield

“Dominance” and “protection” sum up the Defense Department’s goals as U.S. armed forces begin to modernize their networks and communications systems. DOD is investing significant resources in providing troops with…

Account Takeover IS Your Problem — SolarWinds TechPod 020

Phishing and malware are scary enough, but the number one tactic used by bad actors to get access to and take over accounts is something different: using compromised credentials. Why?…