<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Brand Studio &#187; SolarWinds</title>
	<atom:link href="http://www.washingtonpost.com/sf/brand-connect/wp/tag/solarwinds/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.washingtonpost.com/sf/brand-connect</link>
	<description></description>
	<lastBuildDate>Thu, 13 Jul 2017 15:20:43 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.2.7</generator>
	<item>
		<title>Federal inside cyber threats should be attacked from all sides</title>
		<link>http://www.washingtonpost.com/sf/brand-connect/wp/enterprise/federal-inside-cyber-threats-should-be-attacked-from-all-sides/</link>
		<comments>http://www.washingtonpost.com/sf/brand-connect/wp/enterprise/federal-inside-cyber-threats-should-be-attacked-from-all-sides/#comments</comments>
		<pubDate>Mon, 05 Oct 2015 04:05:44 +0000</pubDate>
		<dc:creator><![CDATA[herrn]]></dc:creator>
				<category><![CDATA[SolarWinds]]></category>

		<guid isPermaLink="false">http://www.washingtonpost.com/sf/brand-connect/?post_type=enterprise&#038;p=3428</guid>
		<description><![CDATA[Government IT administrators long have been trained to keep an eye out for the threats that come from outside their firewalls. But what if the greatest threats actually come from within? According to a recent federal cybersecurity survey conducted by SolarWinds and Market Connections, that is a question that many Department of Defense and other [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Government IT administrators long have been trained to keep an eye out for the threats that come from outside their firewalls. But what if the greatest threats actually come from within?</p>
<p>According to a recent federal cybersecurity survey conducted by SolarWinds and Market Connections, that is a question that many Department of Defense and other government IT managers struggle to answer. In fact, the majority of the 200 respondents said they believe malicious insider threats are just as damaging as external threats. Further, one-third of respondents said they believe accidental insiders can be as dangerous as those who harbor malicious intent.</p>
<p>Welcome to the post-Edward Snowden and Bradley Manning world of federal IT, where an anonymous hacker can do just as much damage as a USB drive left carelessly on a desk. It’s an environment where technology, training and policies must be consistently deployed, and work together, to ensure lock-down security.</p>
<p><strong>Technology is shifting</strong><br />
With the number of devices and users rapidly increasing, manual network monitoring is no longer feasible. As noted by survey respondents, ‘top tier’ tools to prevent internal and external threats pertain to identity and access management, intrusion prevention and detection and security incident and event management (or log management) .</p>
<p>Each solution offers continuous and automatic network monitoring, removing most of the day-to-day burden from IT managers. The tools alert administrators of anomalies, including breaches, data leaks, suspicious activity and unauthorized users and devices. Problems accurately can be traced to individual users and devices, helping identify the root cause of potential insider threats. Most important, administrators can address any potential issues far more quickly than ever before.</p>
<p>Ideally, tools should be easy to install and configure so they can deliver immediate value to any IT organization without extensive customization by outside consultants. However, tools also need to be supported with proper procedures and trained professionals who understand the importance of security and maintaining constant vigilance.</p>
<p><strong>Don’t forget to train humans, too</strong><br />
Reflecting the importance of agency-wide training, 53 percent of respondents said careless and untrained insiders are the largest threat at federal agencies, while 35 percent stated “lack of IT training” is a key barrier to insider threat detection. IT personnel should be trained on technology protocols and the latest government security initiatives and policies, and receive frequent and in-depth information on agency-specific initiatives that could impact or change how security is handled throughout the organization.</p>
<p>All employees should be aware of the dangers and costs of accidental misuse of agency information or rogue devices. Forty-seven percent of survey respondents stated employee or contractor computers were the most at-risk sources for data loss, with 42 percent granting that designation to removable storage devices such as USB drives or CDs. Human error is often far more dangerous than explicit intent.</p>
<p><strong>Policies should be carefully targeted</strong><br />
When it comes to accidental or careless insider threats, 56 percent of survey respondents were somewhat confident in their security policies, while only 31 percent were “very confident.”</p>
<p>Agency security policies, combined with federal policies serve as a security blueprint and are therefore extremely important. These policies include the Defense Information System Agency’s Security Technical Implementation Guides and the National Institute of Standards and Technology’s Federal Information Security Management Act Overall, policies should plainly outline the agency’s overall security approach and include specific details such as authorized users and use of acceptable devices.</p>
<p>Alarmingly, “security holes begin at the top…[senior managers] expect that they are protected and they are above any security holes—to the effect [that] they insist on admin rights to network resources,” one respondent said. Authorization for administrative users should not be based on rank—access should be limited only to those who absolutely need to get to specific data. The list should be small and continually monitored and adjusted. IT administrators should also maintain a list of authorized devices allowed to touch the network. This device ‘white list’ is critically important, especially as more devices begin to proliferate on the network, and bring-your-own-device remains a security challenge.</p>
<p>“Security is a challenge, and the enemy is increasingly sophisticated,” a respondent said. More and more, the enemy attacks from all fronts—externally and internally. Federal IT managers clearly need to be prepared to combat the threat using their own three-pronged defense of technology, training and policies.</p>
<p><img class="aligncenter size-full wp-image-3429" src="http://www.washingtonpost.com/sf/brand-connect/wp-content/uploads/sites/3/2015/09/chart.png" alt="chart" width="1652" height="1915" /></p>
<p>&nbsp;</p>
<p><em>Source: Content originally published on AFCEA.org</em></p>
]]></content:encoded>
			<wfw:commentRss>http://www.washingtonpost.com/sf/brand-connect/wp/enterprise/federal-inside-cyber-threats-should-be-attacked-from-all-sides/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	            <image>
                <url>http://www.washingtonpost.com/sf/brand-connect/wp-content/uploads/sites/3/2015/09/iStock_000023740838_Double_1MB.jpg</url>
                <title></title>
                <link>http://www.washingtonpost.com/sf/brand-connect</link>
            </image>
        	</item>
		<item>
		<title>Careless insiders are government&#8217;s biggest cybersecurity threat</title>
		<link>http://www.washingtonpost.com/sf/brand-connect/wp/enterprise/careless-government-insiders-biggest-cybersecurity-threat/</link>
		<comments>http://www.washingtonpost.com/sf/brand-connect/wp/enterprise/careless-government-insiders-biggest-cybersecurity-threat/#comments</comments>
		<pubDate>Tue, 08 Sep 2015 04:05:06 +0000</pubDate>
		<dc:creator><![CDATA[herrn]]></dc:creator>
				<category><![CDATA[SolarWinds]]></category>

		<guid isPermaLink="false">http://www.washingtonpost.com/sf/brand-connect/?post_type=enterprise&#038;p=3188</guid>
		<description><![CDATA[If you were to guess the biggest threat to government cybersecurity, you’d probably say some outside hacking syndicate. You’d be wrong. “Our security holes begin at the top,” said a network manager at a federal agency. “Senior management expects &#8220;that they are protected and they are above any security holes &#8211; to that effect, they [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>If you were to guess the biggest threat to government cybersecurity, you’d probably say some outside hacking syndicate. You’d be wrong.</p>
<p>“Our security holes begin at the top,” said a network manager at a federal agency. “Senior management expects &#8220;that they are protected and they are above any security holes &#8211; to that effect, they insist on admin rights to network resources. The administration supports this view and turns a ‘blind eye’ to the risk.”</p>
<p>In December 2014, Market Connections, a leading government market research provider, in conjunction with <a href="http://www.solarwinds.com/federal_government/it-management-solutions-for-government.aspx">SolarWinds</a> conducted its second annual blind <a href="http://www.solarwinds.com/resources/surveys/solarwinds-federal-cybersecurity-survey-summary-report-2015.aspx">survey </a>of 200 IT and IT security decision makers in the federal government, military and intelligence communities to uncover their most critical IT security challenges and to determine how to make potential security threats visible so IT can confront them.</p>
<p>A key finding was that federal IT professionals identified careless and untrained insiders as the greatest source of cybersecurity threats &#8211; over malicious external sources such as hackers and terrorists &#8211; yet disparately reported that malicious external threat sources maintained priority for threat prevention investment.</p>
<p>View the infographic for data on top sources of security threats and most damaging breaches, top obstacles to threat prevention, concern versus investment in resources and top tools to prevent threats.</p>
<p><a href="http://www.solarwinds.com/assets/infographics/cybersecurity-in-the-federal-government.aspx"><img class=" aligncenter" src="http://cdn.swcdn.net:80/creative/v2.3/images/../infographics/Solarwinds_cybersecurity_federal_govt_mobile.png" alt="Cybersecurity in the federal goverment" /></a></p>
<p><a style="color: #359ac0" href="http://www.solarwinds.com/assets/infographics/cybersecurity-in-the-federal-government.aspx">Cybersecurity in the federal goverment</a> from <a href="http://www.solarwinds.com">SolarWinds</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.washingtonpost.com/sf/brand-connect/wp/enterprise/careless-government-insiders-biggest-cybersecurity-threat/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	            <image>
                <url>http://www.washingtonpost.com/sf/brand-connect/wp-content/uploads/sites/3/2015/09/iStock_000021164425_Full_1MB.jpg</url>
                <title></title>
                <link>http://www.washingtonpost.com/sf/brand-connect</link>
            </image>
        	</item>
		<item>
		<title>Strategies for fighting the growing issue of insider cybersecurity threats</title>
		<link>http://www.washingtonpost.com/sf/brand-connect/wp/enterprise/strategies-for-fighting-the-growing-issue-of-insider-cybersecurity-threats/</link>
		<comments>http://www.washingtonpost.com/sf/brand-connect/wp/enterprise/strategies-for-fighting-the-growing-issue-of-insider-cybersecurity-threats/#comments</comments>
		<pubDate>Mon, 17 Aug 2015 04:05:46 +0000</pubDate>
		<dc:creator><![CDATA[herrn]]></dc:creator>
				<category><![CDATA[SolarWinds]]></category>

		<guid isPermaLink="false">http://www.washingtonpost.com/sf/brand-connect/?post_type=enterprise&#038;p=3111</guid>
		<description><![CDATA[Altruistic hackers are slowly becoming more prominent in pop culture. On television, these young geniuses use their skills to help those in need. ]]></description>
				<content:encoded><![CDATA[<p>Altruistic hackers are slowly becoming more prominent in pop culture. On television, these young geniuses use their skills to help those in need. Their heroism involves taking control of everything from airplanes to traffic signals, all in the name of good. And they do it with style.</p>
<p>If only the real world were so exciting. In reality, the primary threat does not necessarily come from a well-meaning hacker with a modified Alienware computer, but from the person sitting at the next desk over.</p>
<p>According to a 2015 SolarWinds and Market Connections <a href="http://www.solarwinds.com/resources/surveys/solarwinds-federal-cybersecurity-survey-summary-report-2015.aspx" target="_blank">survey </a>of federal IT professionals, insiders are starting to supplant external hackers and terrorists as the greatest cybersecurity threat. In that survey, more than half (53 percent) of respondents identified careless and untrained insiders as the greatest source of IT security threats at their agencies, up from 42 percent <a href="https://thwack.solarwinds.com/community/solarwinds-community/whiteboard/blog/2014/03/26/federal-it-s-biggest-cybersecurity-challenges-and-what-to-do-about-them" target="_blank">last year</a>.</p>
<p>Respondents pointed to several reasons insider threats have become ‘public enemy number one.’ The steadily growing volume of network activity is seen as a primary culprit, as more administrators are being asked to keep up with monumental increases in traffic. The growing use of personal devices is another factor, as is mounting pressure for IT pros to change network configurations <em>quickly</em>, rather than <em>correctly</em>. Combine these issues with simple human error—a misplaced USB drive here, an unattended laptop there—and lack of training, and one can understand how insider threats can loom so large.</p>
<p>Here are three strategies that can help address the growing issue of insider threats.</p>
<p><strong>Continuously monitor the network<br />
</strong><br />
It can be difficult for IT pros to keep up with network activity and remain alert to everything that’s happening on these networks, but doing just that is very important. Solutions that continuously and automatically monitor networks for any anomalies can help. Their alerting capabilities help administrators keep tabs on potential breaches, data leaks, unauthorized users and overall suspicious activity, allowing them to respond and address problems immediately.</p>
<p>Examples of effective monitoring solutions include security information and event management (SIEM) and log and event management software. These solutions provide real-time feedback and alerts that give administrators information about any suspicious network activity. Administrators can use them to accurately track the root of a problem, right down to the individual user who may—inadvertently or not—be compromising the network.</p>
<p><strong>Standardize network configurations<br />
</strong><br />
It’s no news that federal IT pros are pressed for time. But the comment by survey respondents about fast, versus accurate, network configuration is telling, and problematic. Networks that aren’t properly configured can open the doors for employees to make unauthorized and erroneous network changes.</p>
<p>Automating the network configuration process is a good option for time-strapped federal IT pros. Tools can be set up to perform scheduled network configuration backups, bulk change deployment for thousands of devices and more—and do so properly, yet with minimal input from the administrator. These tools not only ease the worry of insider threats but also catch configuration errors and automatically notify the administrator of any compliance issues.</p>
<p><strong> Closely track user devices<br />
</strong><br />
Speaking of devices, employees continue to rely on their personal devices for work, which can create enormous risk. One lost smartphone or stolen laptop can result in a national security issue.</p>
<p>As a result, administrators should implement a strategy that will allow them to accurately and quickly track and monitor devices, switches and ports. Doing so will allow them to easily block unauthorized devices from accessing their networks. They should also create a ‘whitelist’ of authorized devices and set up alerts in case any device that’s not on that list attempts to ping the network.</p>
<p>Insider threats come in many forms. Some are completely intentional, and others are completely innocuous, but all <em>can</em> be extremely dangerous. And, unlike the hacker hero who saves the day in a TV show, none should be taken lightly.</p>
<p><img class="aligncenter size-full wp-image-3114" src="http://www.washingtonpost.com/sf/brand-connect/wp-content/uploads/sites/3/2015/08/SolarWinds_sources_of_security_threats-2.png" alt="SolarWinds_sources_of_security_threats (2)" width="1427" height="2702" /></p>
]]></content:encoded>
			<wfw:commentRss>http://www.washingtonpost.com/sf/brand-connect/wp/enterprise/strategies-for-fighting-the-growing-issue-of-insider-cybersecurity-threats/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	            <image>
                <url>http://www.washingtonpost.com/sf/brand-connect/wp-content/uploads/sites/3/2015/08/SolarWinds_Image_081115_2100px_Adjusted.jpg</url>
                <title></title>
                <link>http://www.washingtonpost.com/sf/brand-connect</link>
            </image>
        	</item>
	</channel>
</rss>
