Latest In

cybersecurity

Assessing Risk – The Key to IT Security — SolarWinds TechPod 023
February 18, 2020
SolarWinds
When it comes to IT security, it can feel overwhelming. What needs securing and at what level? How do you prioritize? But when considering risk, this is very different conversation.…
Careless and Malicious Insider Threats Are on the Rise Despite Better Detection
February 4, 2020
Jim Hansen
According to a 2019 Federal Cybersecurity Survey released last year by IT management software company SolarWinds, careless and malicious insiders topped the list of security threats for federal agencies. Yet,…
New Laws Alone Won’t Be Enough to Secure IoT Devices
January 28, 2020
Jim Hansen
Security concerns over the Internet of Things (IoT) are growing, and federal and state lawmakers are taking action. First, the U.S. Senate introduced the Internet of Things Cybersecurity Improvement Act…
Three Ways the Department of Defense Can Plug Security Holes
January 21, 2020
Brandon Shopp
An early 2019 report from the Defense Department Officer of Inspector General revealed how difficult it’s been for federal agencies to stem the tide of cybersecurity threats. Although the DoD…
Modernizing Security to Protect Next-Generation Federal Networks
January 14, 2020
Brandon Shopp
As agencies across the federal government modernize their networks to include and accommodate the newest technologies such as cloud and the Internet of Things (IoT), federal IT professionals are faced…
Federal IT Pros Optimistic About Security, but Insider Threats Remain a Challenge
January 7, 2020
Jim Hansen
Federal IT professionals feel threats posed by careless or malicious insiders and foreign governments are at an all-time high, yet network administrators and security managers feel like they’re in a…
Dominating and Protecting the Connected Battlefield
November 12, 2019
Brandon Shopp
“Dominance” and “protection” sum up the Defense Department’s goals as U.S. armed forces begin to modernize their networks and communications systems. DOD is investing significant resources in providing troops with…
Account Takeover IS Your Problem — SolarWinds TechPod 020
October 29, 2019
SolarWinds
Phishing and malware are scary enough, but the number one tactic used by bad actors to get access to and take over accounts is something different: using compromised credentials. Why?…
The Do’s and Don’ts of Edge Computing
October 22, 2019
Mav Turner
Edge computing is here to stay and it’s no wonder. Edge computing provides federal IT pros with a range of advantages they simply don’t have with more traditional computing environments.…
Leveraging Key Strategies from Cybersecurity Frameworks to Improve Security
October 15, 2019
Mav Turner
Over the past few years, several critical cybersecurity frameworks have been introduced to help agency IT professionals detect and deter stealthy intruders. These include the Cyber Threat Framework (CTF), the…
148