The 5 Best Ways to Eliminate Boredom and Terror on Your Network: Part 1

You may be thinking, “If network configuration is months of boredom, then why should I read this?” The short answer is, “So you never have to experience those moments of extreme terror!” Today, we will be talking about why network configuration management is so difficult and what’s at stake. This article is a three-part series that will look at five best practices for improving your network configuration management.

Key Takeways From Recent SolarWinds & SANS Cybersecurity Survey

Last week, SolarWinds, working alongside SANS, released the results of an information security survey, involving more than 120 government IT professionals. It was conducted to identify the impact of cybersecurity threats and the use of security analytics and intelligence to resolve those threats. We’ve reviewed their report and have identified these five interesting takeaways:

Technically News - 6/3

This week in Technically News: One Small Step for NASA, One Giant Leap for Open Source; Chinese Hack Targets Weapons’ Designs; SolarWinds Raises Profile in Cloud-Based IT Management; 30 Years of Accumulation: A Timeline of Cloud Computing; Tracking the Evolution of Big Data: A Timeline.

Technically News - 4/22

In this week's Technically News: Students Face Cyber War Game with NSA Hackers; Red Hat’s “PaaS Queen” on OpenStack; 6 Steps to Secure Systems for Sequester; SolarWinds’ Firewall Security Manager Reviewed; DLT Solutions Finds Promise in State & Local Work.

SolarWinds Survey Finds Complexity & Data Loss Are Major Cybersecurity Concerns

SolarWinds, a leading provider of powerful and affordable IT management software, recently released the results of their 2013 SolarWinds Security and Compliance Survey. Over 160 IT professionals were polled and their answers revealed fears about the present and future, on both cybersecurity and the influx of new technology.

GovDefenders Wednesdays: Cybersecurity Starts at the Bottom of the Totem Pole

One of the most frequently misused quotes references the bottom of the totem pole. Many people associate it with negativity - “I’m stuck at the bottom of the totem pole.” However, the bottom is one of the places you wanted to be because it was one of the most honorable positions. It was those at the bottom who everyone relied on to hold society up. Cybersecurity is no different. Those at the bottom now must help hold those at the top.