Ready, Set, Secure Episode 23

Posted: March 16, 2021
Category: Podcast

Click here for the latest episode! Senior Security Consultant Greg Porterfield joins Michael and Nick to discuss his upcoming series on combining his expertise in Data Analytics and his new found interest in penetration testing. Things Mentioned: ·    ...

Continue Reading

Ready, Set, Secure Episode 22

Posted: March 16, 2021
Category: Podcast

Click here for the latest episode! Our hosts got some one on one time with Dr. Anton Chuvakin of Google Cloud to discuss his latest post on Context in Threat Detection.   Things Mentioned: ...

Continue Reading

Ready, Set, Secure Episode 21

Posted: March 16, 2021
Category: Podcast

Click here for the latest episode! One of our favorite ethical hackers is back to discuss GRC Tenets, the Set Solutions maturity model, and much more! Things Mentioned: ·      ...

Continue Reading

Ready, Set, Secure Episode 20

Posted: March 16, 2021
Category: Podcast

Click here for the latest episode! Michael and Nick are back to kick off a brand-new series featuring Cybersecurity Influencers! First up is Ron Gula, President at Gula Tech Adventures which focuses on cyber technology, cyber policy and recruiting more people to the cyber workforce. Check out ...

Continue Reading

Developing a Risk Based Vulnerability Management Program

Posted: March 11, 2021

There are many vectors for an attacker to penetrate an organization. The method of taking advantage of vulnerabilities in an environment is one of the common vectors for an attacker. I have had an opportunity to work with some of the vulnerability assessment tools; they are not listed in any ...

Continue Reading

One Does Not Simply Hack APIs… Actually, One Probably Does

Posted: February 12, 2021

Geek Alert Before you read further into this first blog post of my two-part series, be warned that I am about to make analogies comparing Web API security to the epic fantasy trilogy The Lord of the Rings by J.R.R. Tolkien. Yes, I am unapologetically going full geek in this short series. One ...

Continue Reading

SolarWinds Sunburst

Posted: January 26, 2021

Background If you work in Information Security, Technology, or even if you are just a person who stays up to date with recent news headlines, you probably already know about the “Sunburst” hacking fiasco that came to light at the end of December 2020.  I use the term “fiasco” ...

Continue Reading

Implementing a Risk-Based Vulnerability Management Strategy

Posted: January 21, 2021

Effective cybersecurity is a continuous process. There is no such thing as absolute or perfect security—but even if you could achieve it, it would be fleeting. New vulnerabilities are discovered, and new exploits and attack techniques are developed every day. Just because you were secure ...

Continue Reading

Set Solutions Video Series – SOAR Content Management

Posted: January 12, 2021
Category: Video Series

...

Continue Reading

Defining a Solid Vulnerability Management Strategy

Posted: January 8, 2021

There is no such thing as perfect code. Vulnerabilities are a fact of life. Applications contain mistakes, and flaws, and bugs—no matter how small—and attackers work around the clock to find exploits to take advantage of those flaws, gain access to your networks and applications, and compromise ...

Continue Reading