I have some limited background with Solar Winds. I used them in the past in much smaller networks for network management and their solution is certainly well suited for that. One thing I really like about SolarWinds is that they know exactly who they are and what they do. They are not ...
Get the word out.Coordinate with corporate marketing and public relations for any messaging that needs to be made to the press or the public. Perform a security incident post-mortem.Once the security incident is resolved, review what happened, how it happened and what steps can be taken to a...
WTH Happened with the Chinese Spy Balloon? Rep. Mike Gallagher on the Brazen CCP Incursion and the Threat from Communist China February 06, 2023 The Biden Administration has been “too little too late” in countering Russia, and is increasingly playing by the same rules with the Chinese ...
Allie Mellen:I think it’ll be really interesting to see how big a role it plays, because one thing I was reading about, of course,SolarWinds and everything that’s going on there. And one of the key points that an individual writing about it made was that potentially one of the reas...
“What if theSolarWinds serverswere only allowed to talk to the known good rather than being disallowed to connect to the known bad?” he postulated. “Could theTwitter hackhave been avoided if the employees had not been trusted to change the email addresses of accounts? By being prepared fo...
All these log file management challenges can be minimized withcloud-based monitoring and observability services. These include options such as ManageEngine Applications Manager, Azure Monitor,Dynatrace, IBM Instana Observability, APM Insight, SolarWinds AppOptics andAmazon CloudWatch. ...
Solarwinds Orion Network Performance Monitor is what I use with our Windows sys. admins on my web servers. Still getting some useful app metrics running on it, but it has good information on basic box level stuff (disk, network, CPU). For my VMware guests, I love the performance tabs....
If these precautions are not taken, there is a risk that attackers could compromise the development environment and insert malicious code into the application as happened, for example, in the SolarWinds attack. Infrastructure as Code (IaC) When deploying infrastructure as code, IaC files should be...
Another remote access offering from SolarWinds, Dameware Remote Support (DRS) is an on-premises software with similar capabilities to Dameware Remote Everywhere. DRS incorporatesDameware Mini Remote Control, allowing for multi-platform remote access to Windows, Mac, and Linux devices. ...
This step involves using processed data to find answers to questions such as when, why and how a suspicious event occurred. For example, this step answers questions about when a phishing incident happened, what the perpetrator was after, and how phishing emails and a malicious domain are linked...