Defining a Solid Vulnerability Management Strategy
There is no such thing as perfect code. Vulnerabilities are a fact of life. Applications contain mistakes, and flaws, and bugs—no matter how small—and attackers work around the clock to find exploits to take advantage of those flaws, gain access to your networks and applications, and compromise ...
Continue ReadingReady, Set, Secure Episode 19
Click here for the latest episode! It’s time to say “good riddance” to 2020 and look towards a shiny new year! In our season 1 finale Michael and Nick discuss some 2021 cybersecurity predictions from the Set Solutions team and toss in a few of their own as well. Do you have questions ...
Continue ReadingFinding the FireEye Breach IOCs with Data Analytics
The last thing we need to hear about is another big breach, but here we are. Our friends at FireEye were attacked recently. From what I have seen so far, it sounds like this was a nation-state level attack and all the attackers got for their effort was some tools. If an organization is ...
Continue ReadingSecure Cloud Infrastructure, Data Protection, and Incident Response
As organizations embrace digital transformation and migrate to the cloud, it is crucial to keep security in mind. The traditional methods and legacy tools they’ve depended on to defend their local applications and data are not sufficient in the cloud. It is important to understand the unique ...
Continue ReadingData Protection Series Wrap-Up
Hello and welcome back to our Data Protection blog. Thanks to the complexity of the topic, we’re adding a bonus fourth installment/wrap-up and really wanted to get it posted before everyone gets too wrapped-up in holiday shopping and gifts. So, grab a nice mug of hot cocoa (hopefully with ...
Continue ReadingWrapping Up: Importance of Cloud Security and the 5 Core Security Control Themes
Cloud security is crucial. As organizations embrace digital transformation and migrate to cloud environments, it is essential that they understand the shared responsibility model and why it’s important to have the right tools and processes to address unique security concerns in the ...
Continue ReadingReady, Set, Secure Episode 18
Click here to listen to the episode! Did you know that in addition to cybersecurity products and staffing Set Solutions also offers professional services? This week Michael and Nick chat with Director of Professional Services, Lance Grover, to discuss what you should look for in any professional ...
Continue Reading