#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

SolarWinds | Breaking Cybersecurity News | The Hacker News

Category — SolarWinds
SIEM for One, SIEM for All

SIEM for One, SIEM for All

Jul 08, 2014
IT security is not a luxury; it's a necessity. While IT practitioners understand this and are on the lookout for effective security options for their network, security solutions manufacturers tend to serve the enterprise market and large companies more than they do smaller organizations and resource-constrained security teams. The reality is that 99% of IT security departments are resource-constrained in terms of budget, time, and staff. This situation directly aligns with the Security Information & Event Management (SIEM) market. With the scores of costly, appliance-based and enterprise SIEM solutions on the market, the majority of security teams find it difficult to adopt SIEM to strengthen network security. Even if they do manage to meet the high cost of a SIEM purchase, they end up acquiring a SIEM which is too big for their security needs. This means incurring additional appliance maintenance costs, IT staff overhead costs to manage the SIEM product, and training an...
Optimizing Network Security with SolarWinds Firewall Security Manager (FSM)

Optimizing Network Security with SolarWinds Firewall Security Manager (FSM)

Apr 11, 2014
Firewalls are the front-line soldiers, who sit strategically at the edge of your network and defend it from various security threats. Firewalls require constant maintenance and management to ensure that they are accurately configured for optimal security, continuous compliance, and high performance. Manual firewall configuration and change management is a time-consuming, error-prone, and headache-fraught task, especially in today's increasingly complex and dynamic networks and, for organizations dealing with dozens, or very commonly, hundreds of individual firewalls, routers and other network security devices, manual configuration and ongoing ACL changes can quickly become a management nightmare. If not managed correctly, organizations can find themselves exposed to dangerous cyber threats and compliance risks, which can lead to costly repercussions. The key to keeping up with ever-changing and ever-growing firewall rule-sets is automation.By automating firewall configu...
Security Risks of FTP and Benefits of Managed File Transfer

Security Risks of FTP and Benefits of Managed File Transfer

Dec 10, 2013
File transfer services such as FTP or HTTP has been the most common way of file transfer for business requirements. Typically what a file transfer means is that a file transfer protocol such as FTP or HTTP is used to send the stream of bits stored as a single unit in a file system including file name, file size, timestamp and other metadata from one host to another host over a TCP-based network such as the Internet. But this process is not foolproof. FTP, by itself, is not a secure file transfer protocol and it has a lot of security vulnerabilities. It's a known fact that FTP doesn't provide any encryption for data transfer. Most of the times, the requirement in any business is pretty simple: to transfer files between two endpoints in different locations, and the parties involved do not think much about how secure the file transfer process is going to be. Using FTP for official file transfer can leave your data transmission exposed to many security attacks: FTP Bounce Attack Gener...
cyber security

SaaS Security Made Simple

websiteAppomniSaaS Security / SSPM
Simplify SaaS security with a vendor checklist, RFP, and expert guidance.
The Hidden Risks of SaaS: Why Built-In Protections Aren't Enough for Modern Data Resilience

The Hidden Risks of SaaS: Why Built-In Protections Aren't Enough for Modern Data Resilience

Jun 26, 2025Data Protection / Compliance
SaaS Adoption is Skyrocketing, Resilience Hasn't Kept Pace SaaS platforms have revolutionized how businesses operate. They simplify collaboration, accelerate deployment, and reduce the overhead of managing infrastructure. But with their rise comes a subtle, dangerous assumption: that the convenience of SaaS extends to resilience. It doesn't. These platforms weren't built with full-scale data protection in mind . Most follow a shared responsibility model — wherein the provider ensures uptime and application security, but the data inside is your responsibility. In a world of hybrid architectures, global teams, and relentless cyber threats, that responsibility is harder than ever to manage. Modern organizations are being stretched across: Hybrid and multi-cloud environments with decentralized data sprawl Complex integration layers between IaaS, SaaS, and legacy systems Expanding regulatory pressure with steeper penalties for noncompliance Escalating ransomware threats and inside...
What to Look For in a SIEM Solution

What to Look For in a SIEM Solution

Jul 25, 2013
Security Information & Event Management (SIEM) has evolved over the years to become one of the most trusted and reliable solutions for log management, security, and compliance. The demand for SIEM tools is constantly increasing within network and IT security teams. This is due particularly to the colossal surge of security breaches and cyber-attacks that impact corporations and cause financial loss and damaged reputations. When conducting research for an SIEM solution, it's important to be able to identify features that will enable effective detection, prevention, and response to security threats. Below, we'll discuss a number of critical topics to consider when selecting an SIEM solution. Log Correlation – The Heart of SIEM SIEM software works with the principle of log collection and correlation, therefore, it's important to ensure that log correlation happens effectively, in real time, and provides centralized visibility into potentially insecure and non-co...
SolarWinds Log & Event Manager for Log Management and SEIM Security

SolarWinds Log & Event Manager for Log Management and SEIM Security

May 14, 2013
SolarWinds ® Log & Event Manager (LEM) , a full-function Security & Information Event Management (SIEM) solution, delivers powerful log management capabilities in a highly affordable, easy-to-deploy virtual appliance. SolarWinds LEM combines real-time log analysis, event correlation, and a groundbreaking approach to IT search, delivering the visibility, security, and control users need to overcome everyday IT challenges. How does LEM work? SolarWinds LEM integrates with and collects log data from a variety of assets in your IT environment including security appliances, network devices, workstations, operating systems, databases and servers. With the collected and normalized log data, LEM performs real-time, in-memory, non-linear multiple event correlation to analyze device and machine logs, and provides advanced incident awareness on all operational, security and policy-driven events on your network. What can you do with LEM? LEM allows you to alert on securi...
Expert Insights Articles Videos
Cybersecurity Resources