One Does Not Simply Hack APIs… Actually, One Probably Does

Posted: February 12, 2021

Geek Alert Before you read further into this first blog post of my two-part series, be warned that I am about to make analogies comparing Web API security to the epic fantasy trilogy The Lord of the Rings by J.R.R. Tolkien. Yes, I am unapologetically going full geek in this short series. One ...

Continue Reading

SolarWinds Sunburst

Posted: January 26, 2021

Background If you work in Information Security, Technology, or even if you are just a person who stays up to date with recent news headlines, you probably already know about the “Sunburst” hacking fiasco that came to light at the end of December 2020.  I use the term “fiasco” ...

Continue Reading

Implementing a Risk-Based Vulnerability Management Strategy

Posted: January 21, 2021

Effective cybersecurity is a continuous process. There is no such thing as absolute or perfect security—but even if you could achieve it, it would be fleeting. New vulnerabilities are discovered, and new exploits and attack techniques are developed every day. Just because you were secure ...

Continue Reading

Set Solutions Video Series – SOAR Content Management

Posted: January 12, 2021
Category: Video Series

...

Continue Reading

Defining a Solid Vulnerability Management Strategy

Posted: January 8, 2021

There is no such thing as perfect code. Vulnerabilities are a fact of life. Applications contain mistakes, and flaws, and bugs—no matter how small—and attackers work around the clock to find exploits to take advantage of those flaws, gain access to your networks and applications, and compromise ...

Continue Reading

Set Solutions Video Series – SIEM Content Management

Posted: January 5, 2021
Category: Video Series

...

Continue Reading

Ready, Set, Secure Episode 19

Posted: January 5, 2021
Category: Podcast

Click here for the latest episode! It’s time to say “good riddance” to 2020 and look towards a shiny new year! In our season 1 finale Michael and Nick discuss some 2021 cybersecurity predictions from the Set Solutions team and toss in a few of their own as well. Do you have questions ...

Continue Reading

Finding the FireEye Breach IOCs with Data Analytics

Posted: December 16, 2020

The last thing we need to hear about is another big breach, but here we are.  Our friends at FireEye were attacked recently.  From what I have seen so far, it sounds like this was a nation-state level attack and all the attackers got for their effort was some tools.  If an organization is ...

Continue Reading

Secure Cloud Infrastructure, Data Protection, and Incident Response

Posted: December 9, 2020
Category: AWS

As organizations embrace digital transformation and migrate to the cloud, it is crucial to keep security in mind. The traditional methods and legacy tools they’ve depended on to defend their local applications and data are not sufficient in the cloud. It is important to understand the unique ...

Continue Reading

Data Protection Series Wrap-Up

Posted: December 9, 2020

Hello and welcome back to our Data Protection blog.  Thanks to the complexity of the topic, we’re adding a bonus fourth installment/wrap-up and really wanted to get it posted before everyone gets too wrapped-up in holiday shopping and gifts.  So, grab a nice mug of hot cocoa (hopefully with ...

Continue Reading