Archive for

Cybersecurity – General

Perspectives on Shadow IT

Posted: May 24, 2023

While sitting at our booth during a recent conference, a college student asked me a great question: “Is the impact of shadow IT on business good or bad?”  The question stemmed from a point made by one of the student’s instructors, which was that shadow IT is necessary for a business today to ...

Continue Reading

Help Prevent Data Breaches with SSE

Posted: April 26, 2023

Transitioning to SSE: Exploring Benefits and Addressing Challenges It's clear that the four major components of SSE (see Part 1 for details) play a crucial role in preventing data breaches and ensuring a robust security framework for your organization. Now, it's time to delve into the benefits of ...

Continue Reading

Help Prevent Data Breaches with SSE

Posted: April 20, 2023

Introduction Is there anything scarier than the idea of seeing your business making headlines as the victim of the latest data breach? Perhaps the price tag? According to the 2022 IBM Cost of a Data Breach report, 83% of organizations have had more than one data breach at an average cost of ...

Continue Reading

Autonomous Hacking Robots

Posted: April 3, 2023

Imagine a future in which robots exist that can autonomously perform end-to-end hacking campaigns, with zero human interference. These robots are not like the wormable malware that we’ve seen in the past, but instead, use advanced artificial intelligence to dynamically and adaptively wage war ...

Continue Reading

Should chatGPT be allowed in the Enterprise?

Posted: February 16, 2023

Unless you have been living under a rock for the last couple months, you’ve at least heard of chatGPT. If you haven’t tried it yet, you will soon (whether you want to or not). Given Google and Microsoft’s relatively aggressive plans to integrate this capability into all their existing ...

Continue Reading

A Deep Dive into Securing Operational Technology

Posted: January 19, 2023

The security of operational technology, known as OT, has become a widely discussed and important topic in recent years. Generally, OT security is the security of digital devices and networks that interact with the physical world. Think energy grids, manufacturing plants, pipelines, and industrial ...

Continue Reading

Michael Farnum, Set Solutions: “security tools add to your attack surface just like any other technology”

Posted: June 23, 2022

To help secure sensitive data and the workforce from cyber threats, every company requires a selection of IT security solutions, services, and specialists that can implement them. A cybersecurity system is not only about providing the employees with security tools like VPN connections but should ...

Continue Reading

Preparing for a Successful GRC Gap Assessment

Posted: April 21, 2022

With rising regulatory compliance demands and the growing popularity of cybersecurity frameworks, there's been increased interest in governance, risk, and compliance (GRC) gap assessments. The market research firm IDC expects enterprise global GRC spending to rise from $11.3 billion in 2020 to ...

Continue Reading

It’s a… Feature… Gap!

Posted: March 24, 2022

A large part of my role here at Set Solutions is to work with our vendor partners to get to know their technology. I have been working a lot in the last several months with companies focusing their efforts in the “Sec” portion of the DevSecOps space. I’ve noticed something interesting – and ...

Continue Reading

Elastic Cloud on Kubernetes – Part 2

Posted: March 10, 2022

Continuing from where I left off, we’ll be covering configuring network and load-balancing, applying third-party certificates, and configuring the cluster for SAML authentication using Azure. Networking When setting up our basic cluster, we used the default network ...

Continue Reading