/ Jim Hansen

Jim Hansen

Avatar photo
Former Vice President, Application Management, SolarWinds

Jim Hansen

Jim Hansen is the vice president of strategy for applications, infrastructure, and security at SolarWinds, bringing over 20 years of experience to building and delivering simple and effective software solutions. Jim is passionate about meeting customer needs to make their jobs easier and their infrastructures both secure and seamless. He joined SolarWinds in August 2018 to build the security portfolio and has since expanded to cover infrastructure and application monitoring—operating under the belief that cost and complexity shouldn’t be prohibiting factors in achieving application and infrastructure performance and security, especially when the performance and security is mission critical to business success. Prior to SolarWinds, Hansen held leadership roles at AlienVault, Splunk, BigFix, and other security-focused software companies. He holds a B.S. in information and computer science from the University of California at Irvine.

The Latest Posts Featuring Jim Hansen

3 Ideas to Build a Better Cybersecurity Strategy
December 24, 2019
Security
Data from the Center for Strategic and International Studies paints a sobering picture of the modern cybersecurity landscape. The CSIS, which has been compiling data on cyberattacks against government agencies…
Using User Access Management to Defend Against Insider Threats
December 17, 2019
Security
According to the SolarWinds 2019 Cybersecurity Survey, cybersecurity threats are increasing—particularly the threat of accidental data exposure from people inside the agency. According to the survey, 56% of respondents said…
Worried About Protecting Your Data? CDM Is Here to Help
December 3, 2019
Security
The Continuous Diagnostics and Mitigation (CDM) Program, issued by the Department of Homeland Security (DHS), goes a long way toward helping agencies identify and prioritize risks and secure vulnerable endpoints.…
The Do’s and Don’ts of Edge Computing
October 22, 2019
Security
Edge computing is here to stay and it’s no wonder. Edge computing provides federal IT pros with a range of advantages they simply don’t have with more traditional computing environments.…
How Security Leaders Might Minimize Human Error
October 8, 2019
Security
A recent federal cybersecurity survey by SolarWinds found federal IT professionals feel threats posed by careless or malicious insiders or foreign governments are at an all-time high. Worse, hackers aren’t…
Assessing the Navy’s New Cybersecurity Program
September 24, 2019
Security
The Navy’s new Combat to Connect in 24 Hours (C2C24) is an ambitious program with the potential to change naval warfare as we know it. The program is designed to…
2 Key Assets in the Government’s Cybersecurity Battle (Part II)
August 27, 2019
Security
Read part one here. Technology: Providing the Necessary Visibility Cybersecurity personnel can’t succeed without the proper tools, but many of them don’t have the technology necessary to protect their agencies.…
2 Key Assets in the Government’s Cybersecurity Battle (Part I)
August 20, 2019
Security
The Trump administration issued two significant reports in the last couple of months attesting to the state of the federal government’s cybersecurity posture. The Federal Cybersecurity Risk Determination Report and…
Making Every Agency Employee a Security Advocate
July 30, 2019
Security
The rising numbers of data breaches should come as no surprise to federal IT security pros who work every day to ensure agency information is secure. However, these breaches may…
Giving SIEM Tools a Role in Your IT Security Operations
July 16, 2019
Security
While there is no one single solution to guard agencies against all cyberthreats, there are tools that can certainly go a long way toward managing and understanding the cyberthreat landscape.…