Set Solutions Video Series

Posted: March 26, 2020
Category: Video Series


Continue Reading

The Bad, the Ugly, and the Good in Cybersecurity During COVID-19

Posted: March 24, 2020

Challenges in security preceded the disruptions we’re all experiencing during the COVID-19 pandemic. Unfortunately, as many of us are trying to navigate through the issues to start building a “new normal”, bad actors are not taking a break. They look at this as a prime time to exploit the ...

Continue Reading

Coronavirus: Network and Cybersecurity Considerations for Working Remotely

Posted: March 17, 2020

The world is struggling to respond to and contain the coronavirus—or COVID-19—pandemic. Nations and many of the states in the U.S. have put restrictions in place to preemptively quarantine individuals and proactively enforce social distancing in an effort to slow the spread of the infection. As ...

Continue Reading

Critical Splunk Patch Required Before 2020

Posted: November 25, 2019
Category: Splunk

There are two critical issues that all Splunk users need to be aware of around the use of timestamps in Splunk, one of which is highly time sensitive (see bottom of this post for info on how to fix the issue). Beginning on January 1, 2020, Splunk will no longer correctly identify timestamps ...

Continue Reading

Threat Intelligence: Don’t Fall in Love with the Wrong KPIs

Posted: August 12, 2019
Category: Uncategorized

You’ve probably heard of the myth of Narcissus, the Greek hunter who was known for his extreme beauty… and vanity. Many of the old stories talk about how many suitors’ hearts were broken by Narcissus. But in an ironic twist, Narcissus eventually came to his own doom when he saw his reflection ...

Continue Reading

ThreatDay DFW – 2019

Posted: August 12, 2019
Category: Events

ThreatDay DFW 2019 is coming soon! Set Solutions is teaming up with a few passionate cyber security experts from the FBI, Anomali, Flashpoint, and others to provide a day of cybersecurity education and community building. Whether your priorities are ingesting threat intelligence, building a cloud ...

Continue Reading

Endpoint Privilege Management White Paper

Posted: July 23, 2019

Brett Wyer's series of posts (here, here, and here) on Endpoint Privilege Management struck a nerve with some of our customers and partners. We received a lot of comments on the series, mostly about how users with administrative access on their desktop or laptop is still a prevalent problem in many ...

Continue Reading

Introduction to Endpoint Privilege Management (EPM)–Part III

Posted: June 26, 2019
Category: IAM

Hello and welcome back to my blog series on Endpoint Privilege Management.  This is the third and final installment covering common requirements and the features they map to, what’s involved in deploying and maintaining a solution, and how to work with a vendor to do a POC ...

Continue Reading

Introduction to Endpoint Privilege Management (EPM)–Part II

Posted: June 10, 2019
Category: IAM

Hello and welcome to the second of a three-part blog post series covering Endpoint Privilege Management (EPM).  If you’ve stumbled across this and are unfamiliar with the topic, you may want to check out Part I for a high-level overview; otherwise, let’s go ahead and jump right in. How does ...

Continue Reading

Fixing the Cybersecurity Defenses Built on Sand: Network Security Foundations for Digital Transformation

Posted: June 4, 2019
Category: DNS/DHCP

It’s a bit of a mess. Over the years you've bought a bunch of security tools and platforms to address the threat du jour. You have your AV, your Intrusion Detection System (IDS), your next gen firewall (NGFW), your NAC system, and on and on. But somehow you are still vulnerable, and you know it. ...

Continue Reading