Home Search
solarwinds - search results
If you're not happy with the results, please do another search
API Security Outlook: A Guide to API Security
As application architectures become more cloud-native and based on microservices, Application Programming Interfaces (APIs) have become critical to securing your apps as their primary...
Amid Today’s Threat Landscape, Protecting Active Directory is a CISO-Level Concern
Despite Active Directory’s critical role in today’s IT infrastructure, CISOs rarely list protecting it as a top priority. They assume that policy management and...
Global Median Dwell Time Drops Below One Month: FireEye Report
Global Median Dwell Time (defined as the duration between the start of a cyber intrusion and when it is identified) has been reducing over...
How to Remove Single Points of Failure from your Digital Infrastructure
On 24th August, 79AD, the eruption of Mount Vesuvius caught the 20,000 local residents of Pompeii off guard, burying the magnificent Roman trading town...
Cybersecurity Post-COVID: A New Era of Sophistication
2020 was an immensely challenging year for everyone, including the cybersecurity sector. An explosion in remote working endpoints and new technology investments brought about...
Why Zero Trust Model is a Top Priority for Security Leaders Today
Ever since the pandemic hit, companies globally are trying to progress their digital capabilities and rapidly undertaking business transformation initiatives. Despite the revenue declines...
Borderless Cyberattacks Among Bordering Nations Soar
Whenever we read about state-sponsored threat actors, the two countries that strike our minds are Russia and China. Government-motivated cybercriminal groups from these countries...
Here’s Why Security Programs Often Fail
Helen Keller, a famous American author once said, “Security is a superstition. It does not exist in nature.” This quote references the security of...
“Threat intelligence teams are struggling to integrate external data with internal security telemetry”
To drive an effective security program, businesses need to have visibility into the organization’s threat landscape. But to do this, they need to consume...
Singtel Data Breach: 129,000 Customers including Former Employees Affected
The Accellion hack might have gotten overshadowed by the amount of disruption caused by the SolarWinds hack, but it surely is not lagging by...