Posts Tagged: Solarwinds

DorobekINSIDER Live: A Cybersecurity To-Do List

Cybersecurity is everywhere. Major attacks dominate the media, agencies shape their strategies around security, and almost all new employees have to learn about computer safety tips when they start a new job. But despite this apparent pervasive quality of cybersecurity, many agencies still struggle to develop a clear to-do list.

Safeguarding against Shadow IT

This interview is an excerpt from our recent guide, The Future of Cybersecurity, which examines 15 trends transforming the way government safeguards information and technology. Increasingly, consumers want to bring their own technology solutions and devices into the workplace. However, “shadow IT” – unauthorized devices used within the workplace without the knowledge of the IT… Read more »

The Visibility Problem

The bridge between the IT world and the “real” world seems to be widening. IT folks are tackling complex technology issues of today without fully understanding how minor errors can majorly impact the everyday user. Meanwhile, us common folk don’t even understand what makes the Internet work. The two worlds can’t seem to collide, one… Read more »

Creating a Holistic Environment with Multiple Solutions

This interview is an excerpt from GovLoop’s recent guide, The DoD of Tomorrow, which explores how the department is transforming its operations, technology, workforce, and acquisitions process to confront 21st century challenges. The Department of Defense is an incredibly multifaceted organization. To support that complexity, DoD personnel must craft an equally dynamic IT architecture while… Read more »

Supporting Insider Threat Identification with Continuous Monitoring

The following interview with Chris LaPoint, Group Vice President of Product Management at SolarWinds, is an excerpt from our recent guide, Securing Government: Lessons from the Cyber Frontlines. In this guide, we review five tactics government organizations are using to enhance their cybersecurity. The risk of insider threats isn’t anything new – recent breaches like WikiLeaks and Edward Snowden’s… Read more »