Finding the FireEye Breach IOCs with Data Analytics
The last thing we need to hear about is another big breach, but here we are. Our friends at FireEye were attacked recently. From what I have seen so far, it sounds like this was a nation-state level attack and all the attackers got for their effort was some tools. If an organization is ...
Continue ReadingSecure Cloud Infrastructure, Data Protection, and Incident Response
As organizations embrace digital transformation and migrate to the cloud, it is crucial to keep security in mind. The traditional methods and legacy tools they’ve depended on to defend their local applications and data are not sufficient in the cloud. It is important to understand the unique ...
Continue ReadingData Protection Series Wrap-Up
Hello and welcome back to our Data Protection blog. Thanks to the complexity of the topic, we’re adding a bonus fourth installment/wrap-up and really wanted to get it posted before everyone gets too wrapped-up in holiday shopping and gifts. So, grab a nice mug of hot cocoa (hopefully with ...
Continue ReadingWrapping Up: Importance of Cloud Security and the 5 Core Security Control Themes
Cloud security is crucial. As organizations embrace digital transformation and migrate to cloud environments, it is essential that they understand the shared responsibility model and why it’s important to have the right tools and processes to address unique security concerns in the ...
Continue ReadingReady, Set, Secure Episode 18
Click here to listen to the episode! Did you know that in addition to cybersecurity products and staffing Set Solutions also offers professional services? This week Michael and Nick chat with Director of Professional Services, Lance Grover, to discuss what you should look for in any professional ...
Continue ReadingGraphing Modem Data for Fun: Part 6
I started the work on this series three months ago, which seems like both a very long time ago, and not very long ago at all. This blog series started out with a very simple use case. Can we use Grafana and InfluxDB to visualize metric data from an application? I was going to write a single ...
Continue ReadingCommon Challenges of Data Protection Programs
Hello and welcome back to the third installment of our Data Protection blog series. So far, in part one we took a high-level view of the topic, then in part two we dug into the five pillars of an effective program. Now that we understand the topic and the pieces that make it up, it’s time to ...
Continue ReadingReady, Set, Secure Episode 17
Click Here to listen to the latest episode! Michael and Nick are joined by a special guest this week – Set Solutions Director of Talent Acquisition Shera Southerland! In this episode the team talks about everything from the technical skills gap to what to wear for a zoom interview. You ...
Continue Reading