Set Solutions Video Series – Cloud Identity and Access Management

Posted: April 8, 2020
Category: AWS, Cloud, Video Series

...

Continue Reading

Set Solutions Video Series – The Five Core Control Themes

Posted: April 2, 2020
Category: AWS, Cloud, Video Series

...

Continue Reading

Set Solutions Video Series – the Principals of Cloud Security

Posted: March 31, 2020
Category: Video Series

...

Continue Reading

Set Solutions Video Series

Posted: March 26, 2020
Category: Video Series

...

Continue Reading

The Bad, the Ugly, and the Good in Cybersecurity During COVID-19

Posted: March 24, 2020

Challenges in security preceded the disruptions we’re all experiencing during the COVID-19 pandemic. Unfortunately, as many of us are trying to navigate through the issues to start building a “new normal”, bad actors are not taking a break. They look at this as a prime time to exploit the ...

Continue Reading

Coronavirus: Network and Cybersecurity Considerations for Working Remotely

Posted: March 17, 2020

The world is struggling to respond to and contain the coronavirus—or COVID-19—pandemic. Nations and many of the states in the U.S. have put restrictions in place to preemptively quarantine individuals and proactively enforce social distancing in an effort to slow the spread of the infection. As ...

Continue Reading

Critical Splunk Patch Required Before 2020

Posted: November 25, 2019
Category: Splunk

There are two critical issues that all Splunk users need to be aware of around the use of timestamps in Splunk, one of which is highly time sensitive (see bottom of this post for info on how to fix the issue). Beginning on January 1, 2020, Splunk will no longer correctly identify timestamps ...

Continue Reading

Threat Intelligence: Don’t Fall in Love with the Wrong KPIs

Posted: August 12, 2019
Category: Uncategorized

You’ve probably heard of the myth of Narcissus, the Greek hunter who was known for his extreme beauty… and vanity. Many of the old stories talk about how many suitors’ hearts were broken by Narcissus. But in an ironic twist, Narcissus eventually came to his own doom when he saw his reflection ...

Continue Reading

ThreatDay DFW – 2019

Posted: August 12, 2019
Category: Events

ThreatDay DFW 2019 is coming soon! Set Solutions is teaming up with a few passionate cyber security experts from the FBI, Anomali, Flashpoint, and others to provide a day of cybersecurity education and community building. Whether your priorities are ingesting threat intelligence, building a cloud ...

Continue Reading

Endpoint Privilege Management Whitepaper

Posted: July 23, 2019
Category: Uncategorized

Brett Wyer's series of posts (here, here, and here) on Endpoint Privilege Management struck a nerve with some of our customers and partners. We received a lot of comments on the series, mostly about how users with administrative access on their desktop or laptop is still a prevalent problem in many ...

Continue Reading