Latest In

security planning

Breach Data Trends: October 2019 to March 2020
May 6, 2020
Kathleen Walker
Most of us have no idea if our credentials are out in the wild, for bad actors to take and use for malicious intent. Unfortunately, they often are. Since October…
Maintaining a Secure Environment: Monitoring Beyond the Log File
October 9, 2019
Natalie Timms
This blog series has been all about taking a big step back and reviewing your ecosystem. What do you need to achieve? What are the organization’s goals and mandates? What…
2 Key Assets in the Government’s Cybersecurity Battle (Part I)
August 20, 2019
Jim Hansen
The Trump administration issued two significant reports in the last couple of months attesting to the state of the federal government’s cybersecurity posture. The Federal Cybersecurity Risk Determination Report and…
Maintaining a Secure Environment: Understanding Its Components
August 19, 2019
Natalie Timms
In the previous blog, we discussed how defining use cases mapped to important security and business- related objectives are the first step in building and maintaining a secure environment. We’ve…
Why Investing in Software Security Is Worth It
July 18, 2019
Denny Cherry
Building IT software isn’t always the most secure process. The reason for this is simple economics. Companies can’t always afford to build in the security features software needs to be…
When “Trust but Verify” Isn’t Enough: Life in a Zero Trust World
May 22, 2019
Becky Elliott
Welcome to the first in a five-part series focusing on information security in a hybrid IT world. Because I’ve spent the vast majority of my IT career as a contractor…
SolarWinds Lab Episode 74: Security Tools to Fit Today’s Threats
March 15, 2019
orangemattersw
In this episode, Head Geeks™ Destiny Bertucci and Thomas LaRock will show you how to ward off security dangers using SolarWinds software. See how SQL injection can be rooted out and how…
7 Steps to Build an Effective Cyberincident Response Process
March 6, 2019
Jim Hansen
As an IT security professional, you work hard to prevent cyberattacks. You patch your systems regularly, update antivirus libraries, run user trainings, and lock down user access to sensitive systems…
The Cybersecurity Threat Is Coming from Inside the Business – A Quick Guide to Insider Threats
February 6, 2019
Jim Hansen
When you hire someone, you expect them to care about your business. You want them to take care of your intellectual property and data. Unfortunately, not everyone has the best…
You Are Here – Endpoint & Application Security
November 1, 2018
Chris Grundemann
So far in this series we have reviewed a few popular and emerging models and frameworks. These tools are meant to help you make sense of where you are and how…
12