Recent Articles by Jim Hansen

7 Steps to Build an Effective Cyberincident Response Process

09/17/25 Yet despite all the money you spend, the tools you buy, and the effort you put in to preven...

Monitoring Challenges Emerge as Agencies Embrace Container Technology

02/15/21 Container technology is catching on big-time in the federal government as agencies such as ...

COVID-19 Pushes Schools to Their Limit, and the Cloud Shows Its Worth

11/30/20 For educators, students, and parents, the impact of the COVID-19 pandemic on learning has b...

Five Steps to Developing an Application Modernization Strategy

11/02/20 Supporting legacy applications is problematic for several reasons. These aging systems are ...

Three Ways Federal Agencies Can Manage and Secure Their Hybrid Data Centers

06/23/20 As hybrid environments become more popular, federal IT teams are faced with managing and se...

Solving the Contractor Breach Challenge

05/05/20 According to our Federal Cybersecurity Survey Report from last year, more than half of fede...

APM: The Secret to Digital Transformation

02/10/20 By now, we’ve talked about the findings of SolarWinds Cloud Confessions 2020 and recommen...

A Trusted Roadmap for Full APM Success

02/07/20 A 2020 SolarWinds survey, SolarWinds Cloud Confessions 2020, showed APM tools have hit main...

Confession: We’re Not Using APM to its Potential

02/05/20 After years of application developers only using application performance management (APM) t...

Careless and Malicious Insider Threats Are on the Rise Despite Better Detection

02/04/20 According to a 2019 Federal Cybersecurity Survey released last year by IT management softwa...