Secure by Design consists of several key principles for how we approach security and cyber resiliency at SolarWinds. We’re working to create a more secure environment and build system centered around transparency and maximum visibility.
Our guiding principles:
You can learn more about Secure by Design by reading our FAQ.
Despite the security of the software supply chain being fundamental to ensuring the fortification of modern applications, supply chain attacks often go undetected. In this Q&A between IDC and SolarWinds, we drill down into what you need to know about software supply chain security, including what it is, the current state of the supply chain, and how organizations can get started addressing supply chain security.
Does adopting an assume breach mindset makes sense for your business? This whitepaper discusses the current state of breaches, key considerations for building a security strategy, and what we’ve learned in our journey of adopting an assume breach mindset with observability.
When adopting a zero-trust culture, you’re determining a way to effectively reduce attack aperture and risk. We’ve taken zero trust a step further to an assume breach position, a mindset enabling organizations to identify and address gaps in the detection and prevention of attacks; the response to an attack and penetration; the recovery from an attack, tamper, or leak; and the prevention of future attacks or breaches.
The approach is designed to securely connect the right users to the right data at the right time under the right conditions while protecting the organization from cyber threats in a highly volatile environment. Operating with this assumption reshapes detection and response strategies and pushes the limits of any organization’s infrastructure, people, processes, and technologies, leading to improved cyber resiliency.
To learn more, you can read our blog post summary and watch this video of SolarWinds CISO and VP, Security Tim Brown speaking with Adam Meyers from CrowdStrike at VentureBeat’s Intelligent Security Summit.
Our Secure by Design approach is designed to secure software environments, development processes, and products. This approach includes increasing training for employees, adopting an assume breach mindset, leveraging red teams, and creating a unique triple-build software development process.
In this podcast episode, SolarWinds CISO and VP, Security Tim Brown explains our Next-Generation Build System and how it can serve as an industry model for secure software development and help make supply chain attacks more difficult.
The Future of Software Supply Chain Security With SolarWinds
SolarWinds CISO and VP, Security Tim Brown weighs in on the findings presented in “The Need for Leading Edge Software Supply Chain Security,” a Q&A between SolarWinds and IDC. In his blog post, Brown details what we’re doing at SolarWinds to further secure our supply chain and improve security efforts for ourselves and our customers.
Key Lessons for Building Secure and Resilient Ecosystems From the Forbes CIO Summit
How can organizations protect themselves from more sophisticated and patient cyberattackers? At the Forbes CIO Summit, SolarWinds CISO and VP, Security Tim Brown spoke about the sophistication level of adversaries and how to minimize future security risks.
The CISO Perspective
CDW Technology Vice President and Chief Information Security Officer Ruben Chacon, SolarWinds CISO and VP, Security Tim Brown, and SolarWinds Head Geek™ Thomas LaRock talk about what the CISO needs to know to face today’s escalating cybersecurity threats—and what it’s like to be in the “hot seat” when challenges inevitably arise.