Archive for

Author

Ready, Set, Secure Episode 48

Posted: September 30, 2022
Category: Podcast

Click here to watch the livestream or click here to download the latest episode! As the collective hangover of BlackHat and DefCon finally subsides we’ve rounded up two of our first time attendees to recap! Join us with first time BlackHat attendee, Greg Porterfield, and first time DefCon ...

Continue Reading

Ready, Set, Secure Episode 47

Posted: September 30, 2022
Category: Podcast

Click here to watch the livestream or click here to download the latest episode! When it comes to your external API’s obscurity cannot prevent a breach - it will merely delay one until a more determined attacker comes along. So, what can you do to protect your organization? On this episode ...

Continue Reading

Ready, Set, Secure Episode 46

Posted: September 30, 2022
Category: Podcast

Click here to watch the livestream or click here to download the latest episode! There are a ton of tools and processes for figuring out a bill of materials, finding vulnerabilities, and building remediations for modern software. But doing all of that for firmware is a completely different ...

Continue Reading

Benefits of a Positive Security Model Webinar

Posted: August 3, 2022

Positive Security is a model that enables access to known trusted resources rather than trying to determine what activity or entities have hostile intent. Applying a positive security model when protecting your APIs can offer direct benefits such as reduction in false negatives, lower reliance on ...

Continue Reading

Ready, Set, Secure Episode 45

Posted: August 3, 2022
Category: Podcast

Click here to watch the livestream or click here to download the latest episode! Michael and Greg are back after a short summer hiatus to discuss the latest report from the Kiteworks team around privacy and compliance. They’re joined by Kiteworks CISO Frank Balonis who deep dives into getting ...

Continue Reading

Michael Farnum, Set Solutions: “security tools add to your attack surface just like any other technology”

Posted: June 23, 2022

To help secure sensitive data and the workforce from cyber threats, every company requires a selection of IT security solutions, services, and specialists that can implement them. A cybersecurity system is not only about providing the employees with security tools like VPN connections but should ...

Continue Reading

Compliance Webinar

Posted: June 23, 2022
Category: Video Series

When it comes to your organizations Cybersecurity defenses, Technology isn’t a cure all. Cybersecurity tools are just one piece of the puzzle of a company’s operational resilience. The key to minimizing your company’s exposure is to ensure that risk is balanced across people, process, and ...

Continue Reading

Cybersecurity Insurance Webinar

Posted: June 23, 2022
Category: Video Series

Insurance companies are doubling premiums, raising deductibles, and denying coverage. The pressure falls on the Information Security team to quickly solve this problem. When these demands get made, Insurance providers typically require: Multi-Factor Authentication Privileged Access ...

Continue Reading

GRC Assessment Review with Michael Seaman

Posted: June 23, 2022
Category: Video Series

As laws and regulations develop in the cybersecurity space, GRC is becoming a larger part of enterprise organizations overall security program. Today GRC Practice Lead Stephen Alexander and Senior Security Consultant Leo Magallon chat with one of our customers to discuss the process of a GRC ...

Continue Reading

The Benefits of Cloud Identity Governance

Posted: June 2, 2022
Category: Cloud

Thanks to the rush to digitally transform themselves, businesses build, deploy, and use more applications than ever. While this growth of applications is undoubtedly helping improve productivity, it’s also increasing digital security risks if organizations are not careful. This is especially true ...

Continue Reading