The 5 Best Ways to Eliminate Boredom and Terror on Your Network: Part 2
In this installment, we will talk about three specific best practices that will help you improve network uptime and operational success and save you time and money.
The 5 Best Ways to Eliminate Boredom and Terror on Your Network: Part 1
You may be thinking, “If network configuration is months of boredom, then why should I read this?” The short answer is, “So you never have to experience those moments of extreme terror!” Today, we will be talking about why network configuration management is so difficult and what’s at stake. This article is a three-part series that will look at five best practices for improving your network configuration management.
Critical Intel: Three Steps to Preventing USB Data Breaches
In today's National Cybersecurity Awareness Month blog, SolarWinds' VP of Product Management, Chris LaPoint, takes us behind the scenes of USB drive security awareness and ways to ensure mobile data remains secure.
October is Cybersecurity Awareness Month
It’s that time of the year again. The leaves are changing color, the wind is chillier, and Christmas decorations are already out at Target. Today is October 1, and for a decade now that means it’s also the first day of Cybersecurity Awareness Month.
Key Takeways From Recent SolarWinds & SANS Cybersecurity Survey
Last week, SolarWinds, working alongside SANS, released the results of an information security survey, involving more than 120 government IT professionals. It was conducted to identify the impact of cybersecurity threats and the use of security analytics and intelligence to resolve those threats. We’ve reviewed their report and have identified these five interesting takeaways:
Technically News - 6/3
This week in Technically News: One Small Step for NASA, One Giant Leap for Open Source; Chinese Hack Targets Weapons’ Designs; SolarWinds Raises Profile in Cloud-Based IT Management; 30 Years of Accumulation: A Timeline of Cloud Computing; Tracking the Evolution of Big Data: A Timeline.
Technically News - 4/22
In this week's Technically News: Students Face Cyber War Game with NSA Hackers; Red Hat’s “PaaS Queen” on OpenStack; 6 Steps to Secure Systems for Sequester; SolarWinds’ Firewall Security Manager Reviewed; DLT Solutions Finds Promise in State & Local Work.
SolarWinds Survey Finds Complexity & Data Loss Are Major Cybersecurity Concerns
SolarWinds, a leading provider of powerful and affordable IT management software, recently released the results of their 2013 SolarWinds Security and Compliance Survey. Over 160 IT professionals were polled and their answers revealed fears about the present and future, on both cybersecurity and the influx of new technology.
GovDefenders Wednesdays: Cybersecurity Starts at the Bottom of the Totem Pole
One of the most frequently misused quotes references the bottom of the totem pole. Many people associate it with negativity - “I’m stuck at the bottom of the totem pole.” However, the bottom is one of the places you wanted to be because it was one of the most honorable positions. It was those at the bottom who everyone relied on to hold society up. Cybersecurity is no different. Those at the bottom now must help hold those at the top.
Frameworks for Secure Network Management
(Note: This blog comes with permission from Josh Stephens, Vice President of Technology (AKA the Head Geek) for SolarWinds. His blog can be found here: http://geekblog.solarwinds.com/)
Yesterday I was in Washington DC speaking about building frameworks for secure network management.