Set Solutions Podcast
Click here to view - coming soon to all podcast platforms! Set Solutions CTO, Michael Farnum, sits down with Nick DiPasquale (Senior Solutions Architect) and Jonathan Townsend (VP of Engineering) to cover some of the latest security threats and introduce Set's brand new video ...
Continue ReadingThe Bad, the Ugly, and the Good in Cybersecurity During COVID-19
Challenges in security preceded the disruptions we’re all experiencing during the COVID-19 pandemic. Unfortunately, as many of us are trying to navigate through the issues to start building a “new normal”, bad actors are not taking a break. They look at this as a prime time to exploit the ...
Continue ReadingCoronavirus: Network and Cybersecurity Considerations for Working Remotely
The world is struggling to respond to and contain the coronavirus—or COVID-19—pandemic. Nations and many of the states in the U.S. have put restrictions in place to preemptively quarantine individuals and proactively enforce social distancing in an effort to slow the spread of the infection. As ...
Continue ReadingCritical Splunk Patch Required Before 2020
There are two critical issues that all Splunk users need to be aware of around the use of timestamps in Splunk, one of which is highly time sensitive (see bottom of this post for info on how to fix the issue). Beginning on January 1, 2020, Splunk will no longer correctly identify timestamps ...
Continue ReadingThreat Intelligence: Don’t Fall in Love with the Wrong KPIs
You’ve probably heard of the myth of Narcissus, the Greek hunter who was known for his extreme beauty… and vanity. Many of the old stories talk about how many suitors’ hearts were broken by Narcissus. But in an ironic twist, Narcissus eventually came to his own doom when he saw his reflection ...
Continue ReadingThreatDay DFW – 2019
ThreatDay DFW 2019 is coming soon! Set Solutions is teaming up with a few passionate cyber security experts from the FBI, Anomali, Flashpoint, and others to provide a day of cybersecurity education and community building. Whether your priorities are ingesting threat intelligence, building a cloud ...
Continue Reading