Real-time Log Monitoring in the Cloud White Paper

Posted: June 15, 2020
Category: White Paper

Moving to the cloud provides a variety of benefits in terms of performance, availability, scalability, and cost savings. It also creates a more complex infrastructure to try to protect against a massive and expanding threat landscape. Attackers are aware of the increasingly complex network ...

Continue Reading

Has CAPTCHA Outlived its Usefulness?

Posted: June 11, 2020

Historically, CAPTCHA (“Completely Automated Public Turing test to tell Computers and Humans Apart”) challenges have been used to distinguish human web-browsing activities from automated “robot” activity.  To combat increasingly sophisticated bots, CAPTCHA developers have had to ...

Continue Reading

Set Solutions Video Series – Credential Harvesting and Limitations of MFA

Posted: June 10, 2020
Category: Video Series

...

Continue Reading

Set Solutions Podcast Episode 5

Posted: June 3, 2020
Category: Podcast

Click Here to listen to the latest episode! Consulting Services Practice Lead Justin Hutchens and Red Team Security Consultant John Dearman team up to deep dive into the emerging threat landscape. Show notes: ...

Continue Reading

Set Solutions Video Series – Emerging phishing Tactics Part 2

Posted: June 2, 2020
Category: Video Series

...

Continue Reading

Set Solutions Video Series – Emerging Phishing Tactics

Posted: May 28, 2020
Category: Video Series

...

Continue Reading

Set Solutions Video Series – Public Facing Infrastructure Part 2

Posted: May 21, 2020
Category: Video Series

...

Continue Reading

Set Solutions Podcast Episode 4

Posted: May 20, 2020
Category: Podcast

Click Here to download this weeks episode. This week on the Set Solutions podcast Nick and Michael sit down with Brandt Varni to discuss an upcoming white paper on real time logging and monitoring in the cloud. Stay tuned until the very end to catch our chat with Splunk Partner Sales Manager ...

Continue Reading

Set Solutions Video Series – Public Facing Infrastructure Part 1

Posted: May 19, 2020
Category: Video Series

...

Continue Reading

How to MFA the Right Way – Part 3

Posted: May 18, 2020

Security vendors and professionals have been proclaiming that the perimeter is dead for years. The concept of an “inside” and “outside” of the network, where the primary goal was to implement a perimeter defense to keep them separate was eroded away by mobile devices, cloud computing, ...

Continue Reading