Critical Splunk Patch Required Before 2020

Posted: November 25, 2019
Category: Splunk

There are two critical issues that all Splunk users need to be aware of around the use of timestamps in Splunk, one of which is highly time sensitive (see bottom of this post for info on how to fix the issue). Beginning on January 1, 2020, Splunk will no longer correctly identify timestamps ...

Continue Reading

Threat Intelligence: Don’t Fall in Love with the Wrong KPIs

Posted: August 12, 2019
Category: Uncategorized

You’ve probably heard of the myth of Narcissus, the Greek hunter who was known for his extreme beauty… and vanity. Many of the old stories talk about how many suitors’ hearts were broken by Narcissus. But in an ironic twist, Narcissus eventually came to his own doom when he saw his reflection ...

Continue Reading

ThreatDay DFW – 2019

Posted: August 12, 2019
Category: Events

ThreatDay DFW 2019 is coming soon! Set Solutions is teaming up with a few passionate cyber security experts from the FBI, Anomali, Flashpoint, and others to provide a day of cybersecurity education and community building. Whether your priorities are ingesting threat intelligence, building a cloud ...

Continue Reading

Endpoint Privilege Management Whitepaper

Posted: July 23, 2019
Category: Uncategorized

Brett Wyer's series of posts (here, here, and here) on Endpoint Privilege Management struck a nerve with some of our customers and partners. We received a lot of comments on the series, mostly about how users with administrative access on their desktop or laptop is still a prevalent problem in many ...

Continue Reading

Introduction to Endpoint Privilege Management (EPM)–Part III

Posted: June 26, 2019
Category: IAM

Hello and welcome back to my blog series on Endpoint Privilege Management.  This is the third and final installment covering common requirements and the features they map to, what’s involved in deploying and maintaining a solution, and how to work with a vendor to do a POC ...

Continue Reading

Introduction to Endpoint Privilege Management (EPM)–Part II

Posted: June 10, 2019
Category: IAM

Hello and welcome to the second of a three-part blog post series covering Endpoint Privilege Management (EPM).  If you’ve stumbled across this and are unfamiliar with the topic, you may want to check out Part I for a high-level overview; otherwise, let’s go ahead and jump right in. How does ...

Continue Reading

Fixing the Cybersecurity Defenses Built on Sand: Network Security Foundations for Digital Transformation

Posted: June 4, 2019
Category: DNS/DHCP

It’s a bit of a mess. Over the years you've bought a bunch of security tools and platforms to address the threat du jour. You have your AV, your Intrusion Detection System (IDS), your next gen firewall (NGFW), your NAC system, and on and on. But somehow you are still vulnerable, and you know it. ...

Continue Reading

Endpoint Privilege Management – Starting a Blog Series

Posted: May 20, 2019
Category: IAM

Hello and welcome to a new blog post series covering Endpoint Privilege Management (EPM) and the challenges (and benefits) related to managing user privileges.  Over the next several weeks, I’ll be covering various aspects of what we at Set Solutions have learned evaluating and deploying EPM ...

Continue Reading

Splunk is a “Daily Driven” Hypercar – Make Sure You Maintain it!

Posted: May 20, 2019
Category: Splunk

In the world of automobiles, hypercars are reserved for only the top one percent of cars and are specifically designed to push the boundaries of performance and technology. But the effectiveness of those characteristics can’t be preserved without the performance of regular maintenance and ...

Continue Reading

Pulling at the Loose Thread of Open Source Code

Posted: May 20, 2019

Have you ever seen one of those old cartoons where the character starts pulling at a loose thread on a blanket or a shirt? It usually ends up with them pulling apart the whole thing, and they are ultimately left with a big mess of string. That big mess is what many businesses are afraid of when ...

Continue Reading