Archive for

Author

Set Solutions Video Series – Protecting Access to Credentials and PAM Success Strategies

Posted: November 17, 2020
Category: Video Series

...

Continue Reading

What Is Vulnerability Management?

Posted: November 16, 2020

Every application, every system, and—by extension—every organization has vulnerabilities. These flaws and weaknesses expose the organization to risk and can be exploited by attackers. Vulnerability scanning or assessment can identify issues, but you need a more comprehensive solution that ...

Continue Reading

Set Solutions Video Series – Maturing your IAM Program

Posted: November 13, 2020
Category: Video Series

...

Continue Reading

Graphing Modem Data for Fun: Part 5

Posted: November 12, 2020

Hi there! Welcome to part 5 of the series where I explore my cable modem data with different data analytics platforms and see what happens.  In my previous posts I have built a dashboard for my cable modem data using tools that I was not familiar with.  This post is going to be different.  The ...

Continue Reading

Ready, Set, Secure Episode 16

Posted: November 10, 2020
Category: Podcast

Click Here to listen to this episode! On this episode Michael and Nick sit down with Principal Security Strategist Jesika McEvoy in preparation for Rapid7’s upcoming Tech Thursday with Set Solutions. Listen in as they discuss risk, reporting, and actionable insights in vulnerability ...

Continue Reading

Set Solutions Video Series – IAM: The Most Coveted Jewel in your Business

Posted: November 6, 2020
Category: Video Series

...

Continue Reading

Set Solutions Video Series – Protecting the core your organization: Identity and Access Management Intro

Posted: October 27, 2020
Category: Video Series

...

Continue Reading

The Importance of IAM, Logging, and Monitoring in AWS

Posted: October 22, 2020
Category: AWS

You’re probably familiar with the adage, “On the internet, nobody knows you’re a dog.” The premise is simple. If nobody can actually see you, then you can be whoever you claim to be when you’re on the internet. That’s why identity and access management is crucial to the integrity of ...

Continue Reading

Ready, Set, Secure Episode 15

Posted: October 22, 2020
Category: Podcast

Click here to listen! On this episode Michael and Nick chat with Corey Bodzin, CTO of deepwatch, about all of the latest developments with the deepwatch team including their newest tool, Lens Score, and how essential SecOps maturity is to any organization. Things Mentioned: ...

Continue Reading

Graphing Modem Data for Fun: Part 4

Posted: October 22, 2020

Welcome to part 4 of the series.  In the previous posts I have built a dashboard to show the status of my cable modem using different log analytics tools.  In this post I will be using Humio to build the dashboard.  Humio is a relative newcomer to the log analytics space.  A quick scan of the ...

Continue Reading