Set Solutions Video Series – Public Facing Infrastructure Part 1

Posted: May 19, 2020
Category: Video Series

...

Continue Reading

How to MFA the Right Way – Part 3

Posted: May 18, 2020

Security vendors and professionals have been proclaiming that the perimeter is dead for years. The concept of an “inside” and “outside” of the network, where the primary goal was to implement a perimeter defense to keep them separate was eroded away by mobile devices, cloud computing, ...

Continue Reading

Set Solutions Video Series – Inside the Mind of a Hacker

Posted: May 14, 2020
Category: Video Series

...

Continue Reading

Set Solutions Video Series – The Five Core Cloud Security Control Themes

Posted: May 8, 2020
Category: AWS, Cloud, Video Series

...

Continue Reading

Set Solutions Podcast Episode 3

Posted: May 6, 2020
Category: Podcast

Click Here to download this weeks episode.   In this weeks episode Michael Farnum (CTO) and Nick DiPasquale (Sr. Security Solutions Architect) sit down with Victor Mendoza (Sr. Cloud Security Consultant) to discuss Encryption and Key Management. Show Notes ...

Continue Reading

How to MFA the Right Way – Part 2

Posted: April 29, 2020

In the Meantime As we discussed in our previous article, The Right Way to MFA – Part 1, U2F is the “most right” answer from a strictly-security perspective…but it may not be the best business choice at this time for some organizations.  At this time, very few organizations have moved to ...

Continue Reading

Set Solutions Video Series – Cloud Incident Response

Posted: April 28, 2020
Category: AWS, Cloud, Video Series

...

Continue Reading

Set Solutions Video Series – Data Protection

Posted: April 24, 2020
Category: AWS, Cloud, Video Series

...

Continue Reading

Set Solutions Podcast Episode 2

Posted: April 22, 2020

Click Here to download this weeks episode. Episode 2 of the Set Solutions Podcast “Ready, Set, Secure” is out now! Tune in this week as we talk to Justin Hutchens, Set Solutions Consulting Services Practice Lead, about MFA, penetration testing, and much more! Show Notes are listed ...

Continue Reading

How to MFA the Right Way – Part 1

Posted: April 21, 2020

Background In recent years, we have seen a dramatic shift in both the private and public sectors towards Multi-Factor Authentication (MFA) for enterprise remote access services.  As more and more organizations have continued to adopt MFA, cyber criminals have continued to identify increasingly ...

Continue Reading