Home Search

solarwinds - search results

If you're not happy with the results, please do another search

API Security Outlook: A Guide to API Security

0
As application architectures become more cloud-native and based on microservices, Application Programming Interfaces (APIs) have become critical to securing your apps as their primary...
active directory

Amid Today’s Threat Landscape, Protecting Active Directory is a CISO-Level Concern

0
Despite Active Directory’s critical role in today’s IT infrastructure, CISOs rarely list protecting it as a top priority. They assume that policy management and...
median dwell time, Supercharged AI Cyberattacks are Unavoidable

Global Median Dwell Time Drops Below One Month: FireEye Report

0
Global Median Dwell Time (defined as the duration between the start of a cyber intrusion and when it is identified) has been reducing over...
User Verification Policy, zero trust approach

How to Remove Single Points of Failure from your Digital Infrastructure

0
On 24th August, 79AD, the eruption of Mount Vesuvius caught the 20,000 local residents of Pompeii off guard, burying the magnificent Roman trading town...
COVID-19, Corona, Coronavirus

Cybersecurity Post-COVID: A New Era of Sophistication

0
2020 was an immensely challenging year for everyone, including the cybersecurity sector. An explosion in remote working endpoints and new technology investments brought about...
endpoint security

Why Zero Trust Model is a Top Priority for Security Leaders Today

0
Ever since the pandemic hit, companies globally are trying to progress their digital capabilities and rapidly undertaking business transformation initiatives. Despite the revenue declines...
U.S.-Russia Summit

Borderless Cyberattacks Among Bordering Nations Soar

0
Whenever we read about state-sponsored threat actors, the two countries that strike our minds are Russia and China. Government-motivated cybercriminal groups from these countries...
why security programs fail

Here’s Why Security Programs Often Fail

0
Helen Keller, a famous American author once said, “Security is a superstition. It does not exist in nature.” This quote references the security of...
Cyberthreat Intelligence Strategies

“Threat intelligence teams are struggling to integrate external data with internal security telemetry”

0
To drive an effective security program, businesses need to have visibility into the organization’s threat landscape. But to do this, they need to consume...
Singtel data breach

Singtel Data Breach: 129,000 Customers including Former Employees Affected

0
The Accellion hack might have gotten overshadowed by the amount of disruption caused by the SolarWinds hack, but it surely is not lagging by...