Archive for

Author

Elastic Cloud on Kubernetes – Part 1

Posted: February 3, 2022
Category: Cloud

The primary goal of this blog series is to provide an easy-to-follow walk through which by the end of the series enable the reader to: spin up a minimal ECK cluster,configure networking, load balancer, and third-party certificates,configure SSO/SAML authentication,and setup the cluster to ...

Continue Reading

Set Solutions Video Series – Standards Assessment

Posted: February 3, 2022

...

Continue Reading

Ready, Set, Secure Episode 37

Posted: February 3, 2022

Click Here to listen to the latest episode or Click Here to watch the stream! Welcome back to our conversation about Operational Technology. Listen in as VP of Engineering Jonathan Townsend and Senior Solutions Architect Jarrod Cunningham discuss the processes of IT to OT security and how ...

Continue Reading

Ready, Set, Secure Episode 36

Posted: February 3, 2022

Click Here to listen to the latest episode or Click Here to watch the stream! We hope you NEVER need to work with Zachary Hinkel, but in the event of a breach he’s just the person you want on your team. This week Michael and Hutch sit down with Zac to discuss his role as a Ransomware Negotiator, ...

Continue Reading

Ready, Set, Secure Episode 35

Posted: February 3, 2022

Click Here to listen to the latest episode or Click Here to watch the stream!   It’s back! We’re running another month long CTF and brought back last year’s 4-time winner Cody Wheat to talk about how he got started, how CTF’s are training the next generation of security ...

Continue Reading

Ready, Set, Secure Episode 34

Posted: February 3, 2022

Click Here to listen to the latest episode or Click Here to watch the stream! After a short break for Black Hat and DefCon the guys are back to talk about a topic that isn’t always fun but is very important to enterprise organizations – cybersecurity insurance. In this episode Nolen Bucek from ...

Continue Reading

CTFs Aren’t Just a Game

Posted: October 1, 2021

This post is going to be a little different, I want to talk about Capture the Flag games.  I want to offer a perspective from someone who is relatively new to the space but knows just enough to be almost interesting.  I have spent the last year or so playing hacking games, studying, reading, and ...

Continue Reading

Journey of Learning: SQL Injection is fun!

Posted: August 26, 2021

By the time this is posted I will be 1 year into this journey of learning on my path to the OSCP certification.  It’s kind of amazing how much I have learned already, and I have so much more to learn.  I didn’t expect to enjoy attacking applications and servers.  I am a paranoid and cautious ...

Continue Reading

Pen Test Rules of Engagement: What You Need to Consider

Posted: August 12, 2021

In the first post of our series, Security Assessment 101: Planning a Successful Security Assessment, we detailed some of the points necessary to plan a successful security assessment, and we defined the various types of assessments organizations need to periodically conduct if they want to be sure ...

Continue Reading

Ready, Set, Secure Episode 33

Posted: July 29, 2021
Category: Podcast

Click Here to listen to the latest episode or Click Here to watch the stream! This week Wilsonart CISO and Cybersecurity Awareness Evangelist Adam Traylor joins Michael and Hutch for our first live stream! Listen in as the trio discusses promoting cybersecurity best practices across your ...

Continue Reading