Set Solutions is proud to present "Ready, Set, Secure", a podcast on all things cybersecurity!
This episode is brought to you by Secret Double Octopus In a perfect world security would be at the top of everyone's mind, users would stay hyper vigilant, and everyone could access their critical systems without worry. Unfortunately, most users are simply focused on getting into their accounts to get the job done which can result in access falling into the wrong hands. We've seen this time and time again with phishing, nefarious push notifications, and man in the middle attacks resulting in breaches.But what if you could take passwords and unprompted push notifications off the table? In this episode Michael and Greg chat with Don Shin, Security Marketing Strategist at Secret Double Octopus, to discuss the future of passwordless technology. Things Mentioned:· Hutch's talks at RSA - https://www.rsaconference.com/experts/Justin%20Hutchens· Cyberattack on Puerto Rico's Water Authority - https://therecord.media/fbi-investigating-cyberattack-on-puerto-ricoDo you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Keep up with Set Solutions· Twitter: https://twitter.com/setsolutionsinc· LinkedIn: https://www.linkedin.com/company/setsolutionsinc/· Instagram: https://www.instagram.com/set_solutions_inc/· YouTube: https://www.youtube.com/c/SetSolutions/· Facebook: https://www.facebook.com/SetSolutionsInc/Host: Michael Farnum· LinkedIn: https://www.linkedin.com/in/mfarnum/· Twitter: https://twitter.com/m1a1vetCo Host: Greg Porterfield· LinkedIn: https://www.linkedin.com/in/gporterfield/· Twitter: https://twitter.com/GregPorterfieldGuest: Don Shin · LinkedIn: https://www.linkedin.com/in/don-shin-a216391/
This episode is brought to you by Armis.Armis recently released the “State of Cyberwarfare and Trends Report: 2022-2023”. They surveyed over 6,000 IT and Security professionals from all over the globe to determine their sentiments on cybersecurity spend and preparedness. The results were alarming. Michael and Greg spent some time with Armis VP of Product & Industry Solutions, Chris Dobrec, to discuss some of these findings. Things Mentioned:BSides Oklahoma Hutch's talks at RSA Armis State of Cyberwarfare and Trends Report Organizations Preparing for Cyberwar Cyberwarfare Threat Looming Large FBI Takes Down Hive Criminal Ransomware GroupArmis Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Keep up with Set Solutions· Twitter: https://twitter.com/setsolutionsinc· LinkedIn: https://www.linkedin.com/company/setsolutionsinc/· Instagram: https://www.instagram.com/set_solutions_inc/· YouTube: https://www.youtube.com/c/SetSolutions/· Facebook: https://www.facebook.com/SetSolutionsInc/Host: Michael Farnum· LinkedIn: https://www.linkedin.com/in/mfarnum/· Twitter: https://twitter.com/m1a1vetCo Host: Greg Porterfield· LinkedIn: https://www.linkedin.com/in/gporterfield/· Twitter: https://twitter.com/GregPorterfieldGuest: Chris Dobrec · LinkedIn: https://www.linkedin.com/in/christopherdobrec/
Annie Jamshed is a VERY busy woman. When she's not at her day job you can find her running the Houston Affiliate of WiCyS, working hard as the outreach director of CS2AI, or wrangling speakers for HouSecCon. In the middle of all of this Annie found time to sit and chat with Michael and Greg to discuss her journey into cyber, her work (and all the work left to do) for Women in Cyber, and one of our favorite topics – the cybersecurity skills gap. Things Mentioned:https://www.bleepingcomputer.com/news/security/paypal-and-twitter-abused-in-turkey-relief-donation-scams/amp/https://www.bleepingcomputer.com/news/security/sonicwall-warns-web-content-filtering-is-broken-on-windows-11-22h2/https://uh.edu/uh-energy/research/Conklin-ArtWomen in CybersecurityLinkedIn Company Page - https://www.linkedin.com/company/wicys-houston-affiliateLinkedIn Group - https://www.linkedin.com/groups/8966704/ Twitter - https://twitter.com/WicysHouston Instagram - https://www.instagram.com/wicyshoustonaffiliatehttps://www.houstonseccon.org https://www.cs2ai.org Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Keep up with Set Solutions· Twitter: https://twitter.com/setsolutionsinc· LinkedIn: https://www.linkedin.com/company/setsolutionsinc/· Instagram: https://www.instagram.com/set_solutions_inc/· YouTube: https://www.youtube.com/c/SetSolutions/· Facebook: https://www.facebook.com/SetSolutionsInc/Host: Michael Farnum· LinkedIn: https://www.linkedin.com/in/mfarnum/· Twitter: https://twitter.com/m1a1vetCo Host: Greg Porterfield· LinkedIn: https://www.linkedin.com/in/gporterfield/· Twitter: https://twitter.com/GregPorterfieldGuest: Annie · LinkedIn: https://www.linkedin.com/in/qanniej/· Twitter: https://twitter.com/AnnieJamshed
Tired of hearing about Chat GPT? Too bad – we're getting into it. On our last episode co-host Greg Porterfield predicted the growth of ChatGPT for everyday use and in one short month this topic has saturated the internet. This week Greg is joined by our own Kenny Parsons to talk about his ChatGPT presentation at the Dallas DEF CON user group and to discuss all the buzz around this tool, its uses, its limitations, and what the future may look like.Things Mentioned:https://usergroups.splunk.com/events/details/splunk-dallas-area-splunk-user-group-presents-hybrid-dasug-2nd-tuesday2-feb-16-presents-map-usersbus-to-splunk-usecost-with-chargeback-app/https://blogs.microsoft.com/blog/2023/01/23/microsoftandopenaiextendpartnership/Hutch's HouSecCon Talk - https://vimeo.com/766078135DC940 -https://mobile.twitter.com/dcg940 Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Keep up with Set Solutions· Twitter: https://twitter.com/setsolutionsinc· LinkedIn: https://www.linkedin.com/company/setsolutionsinc/· Instagram: https://www.instagram.com/set_solutions_inc/· YouTube: https://www.youtube.com/c/SetSolutions/· Facebook: https://www.facebook.com/SetSolutionsInc/Co Host: Greg Porterfield· LinkedIn: https://www.linkedin.com/in/gporterfield/· Twitter: https://twitter.com/GregPorterfieldGuest: Kenny Parsons · LinkedIn: https://www.linkedin.com/in/kenny-parsons/
2022 is coming to a close which means it's time for our new year's prediction episode! This year Michael and Greg are joined by Set Solutions Director of Solution Architecture, James Hynes, to discuss the problem with machine identity management, the battle of the AIs for code, and the widening cybersecurity skills gap. Things Mentioned:https://www.csoonline.com/article/3661357/7-machine-identity-best-practices.htmlhttps://www.gartner.com/smarterwithgartner/gartner-top-security-and-risk-trends-for-2021 https://www.zdnet.com/article/stack-overflow-temporarily-bans-answers-from-openais-chatgpt-chatbot/https://arstechnica.com/information-technology/2022/12/openai-invites-everyone-to-test-new-ai-powered-chatbot-with-amusing-results/https://vimeo.com/766078135https://thecyberwire.com/stories/9b4819b28766496c8a731382456b48ee/cybersecurity-predictions-for-2023https://www.fedscoop.com/cybersecurity-skills-shortage-has-pushed-federal-agencies-to-poach-staff-from-one-another-says-commerce-cio/https://www.weforum.org/agenda/2022/03/closing-the-cybersecurity-skills-gap/https://www.zdnet.com/article/bad-news-the-cybersecurity-skills-crisis-is-about-to-get-even-worse/TAB Cyber Foundation - https://web.cvent.com/event/0ac8a54d-fbe9-4a16-8510-49dcf538389f/websitePage:f8a0c7fd-f46a-463e-8876-c0d631e3a979Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Keep up with Set Solutions· Twitter: https://twitter.com/setsolutionsinc· LinkedIn: https://www.linkedin.com/company/setsolutionsinc/· Instagram: https://www.instagram.com/set_solutions_inc/· YouTube: https://www.youtube.com/c/SetSolutions/· Facebook: https://www.facebook.com/SetSolutionsInc/
We've hit a huge milestone – 50 episodes! We sat down with our CEO, John Marler, in our brand-new studio to discuss the origins of the podcast, how to add value to the cybersecurity community, and what's next for Set Solutions. Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Keep up with Set Solutions· Twitter: https://twitter.com/setsolutionsinc· LinkedIn: https://www.linkedin.com/company/setsolutionsinc/· Instagram: https://www.instagram.com/set_solutions_inc/· YouTube: https://www.youtube.com/c/SetSolutions/· Facebook: https://www.facebook.com/SetSolutionsInc/Host: Michael Farnum · LinkedIn: https://www.linkedin.com/in/mfarnum/· Twitter: https://twitter.com/m1a1vetCo Host: Greg Porterfield· LinkedIn: https://www.linkedin.com/in/gporterfield/· Twitter: https://twitter.com/GregPorterfieldGuest: John Marler · LinkedIn: https://www.linkedin.com/in/jbmarler/
We've come to the end of our cybersecurity awareness month series and today we're wrapping up with Colin O'Connor of ReliaQuest to talk about managed services. When a direct hire or staff augmentation isn't a good fit for your organization – an MSP could be the best way to bridge the gap. In this episode the guys discuss different business cases for bringing in an MSP, the difference between a company's size and their maturity (and the problems that come with both), when it might NOT make sense to go with an MSP, and how an MSP can help your organization scale up. Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Keep up with Set Solutions· Twitter: https://twitter.com/setsolutionsinc· LinkedIn: https://www.linkedin.com/company/setsolutionsinc/· Instagram: https://www.instagram.com/set_solutions_inc/· YouTube: https://www.youtube.com/c/SetSolutions/· Facebook: https://www.facebook.com/SetSolutionsInc/Host: Michael Farnum · LinkedIn: https://www.linkedin.com/in/mfarnum/· Twitter: https://twitter.com/m1a1vetCo Host: Greg Porterfield· LinkedIn: https://www.linkedin.com/in/gporterfield/· Twitter: https://twitter.com/GregPorterfieldGuest: Colin O'Connor · LinkedIn: https://www.linkedin.com/in/colin-o-connor-4793859/
For the third episode in this special cybersecurity awareness month series Michal and Greg chat with two of the leaders on our services team, Jonathan Townsend, VP of Engineering, and Brandt Varni, Director of Practice Management, to discuss how Staff Augmentation can benefit your organization. In this show they break down when you should consider staff augmentation vs. project-based work or a full-time hire, when technical or cultural fit should be more heavily weighted while selecting resources, planning for staff aug needs vs. emergency placements, and when it's time to look at longer term options. Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Keep up with Set Solutions· Twitter: https://twitter.com/setsolutionsinc· LinkedIn: https://www.linkedin.com/company/setsolutionsinc/· Instagram: https://www.instagram.com/set_solutions_inc/· YouTube: https://www.youtube.com/c/SetSolutions/· Facebook: https://www.facebook.com/SetSolutionsInc/Host: Michael Farnum · LinkedIn: https://www.linkedin.com/in/mfarnum/· Twitter: https://twitter.com/m1a1vetCo Host: Greg Porterfield· LinkedIn: https://www.linkedin.com/in/gporterfield/· Twitter: https://twitter.com/GregPorterfieldGuest: Jonathan Townsend · LinkedIn: https://www.linkedin.com/in/jonathan-townsend/Guest: Brandt Varni· LinkedIn: https://www.linkedin.com/in/brandtvarni/
In the second part of our Skills Gap Series for Cybersecurity Awareness month the guys sit down with our Director of Talent Acquisition, Shera Southerland, and Senior Recruiter, Dan Angel, to discuss hiring top cybersecurity candidates. In this episode you'll hear advice for writing intriguing job descriptions, setting reasonable expectations around cybersecurity roles, and how to set yourself apart from other organizations vying for the same talent. Set Solutions Staffing: https://www.setsolutions.com/staffing/Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Keep up with Set Solutions· Twitter: https://twitter.com/setsolutionsinc· LinkedIn: https://www.linkedin.com/company/setsolutionsinc/· Instagram: https://www.instagram.com/set_solutions_inc/· YouTube: https://www.youtube.com/c/SetSolutions/· Facebook: https://www.facebook.com/SetSolutionsInc/Host: Michael Farnum · LinkedIn: https://www.linkedin.com/in/mfarnum/· Twitter: https://twitter.com/m1a1vetCo Host: Greg Porterfield· LinkedIn: https://www.linkedin.com/in/gporterfield/· Twitter: https://twitter.com/GregPorterfieldGuest: Shera Southerland · LinkedIn: https://www.linkedin.com/in/sherasoutherland/Guest: Dan Angel· LinkedIn: https://www.linkedin.com/in/danielangel91/
We're taking a break from our regular show to deep dive into an urgent need in the cybersecurity industry – qualified people. According to cyberseek.org there are over 700,000 open cybersecurity jobs across the nation, so for Cybersecurity Awareness Month Ready, Set, Secure is focusing on how to close the skills gap to keep your organization up and running. For part one of this series Michael and Greg chat with Lesley Carhart, Director of Incident Response at Dragos and fierce advocate for diversity and mentorship in the cybersecurity industry, about how to get more people involved and what companies can do to continually develop and grow talent. Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Keep up with Set Solutions· Twitter: https://twitter.com/setsolutionsinc· LinkedIn: https://www.linkedin.com/company/setsolutionsinc/· Instagram: https://www.instagram.com/set_solutions_inc/· YouTube: https://www.youtube.com/c/SetSolutions/· Facebook: https://www.facebook.com/SetSolutionsInc/Host: Michael Farnum · LinkedIn: https://www.linkedin.com/in/mfarnum/· Twitter: https://twitter.com/m1a1vetCo Host: Greg Porterfield· LinkedIn: https://www.linkedin.com/in/gporterfield/· Twitter: https://twitter.com/GregPorterfieldGuest: Lesley Carhart · LinkedIn: https://www.linkedin.com/in/lcarhart/· Twitter: https://twitter.com/hacks4pancakes· Website: https://tisiphone.net
We have a special episode today! The guys join Digital Shadows CISO Rick Holland on the Shadow Talk podcast to chat about lessons learned from the Uber breach, educating users, and looking at your 2023 cybersecurity plans. Things Mentioned:· https://resources.digitalshadows.com/threat-intelligence-podcast-shadowtalk· https://www.uber.com/newsroom/security-update/· https://www.nytimes.com/2022/09/15/technology/uber-hacking-breach.htmlDo you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Keep up with Set Solutions· Twitter: https://twitter.com/setsolutionsinc· LinkedIn: https://www.linkedin.com/company/setsolutionsinc/· Instagram: https://www.instagram.com/set_solutions_inc/· YouTube: https://www.youtube.com/c/SetSolutions/· Facebook: https://www.facebook.com/SetSolutionsInc/Host: Michael Farnum · LinkedIn: https://www.linkedin.com/in/mfarnum/· Twitter: https://twitter.com/m1a1vetCo Host: Greg Porterfield· LinkedIn: https://www.linkedin.com/in/gporterfield/· Twitter: https://twitter.com/GregPorterfieldGuest: Rick Holland · LinkedIn: https://www.linkedin.com/in/rickhholland/· Twitter: https://twitter.com/rickhholland
As the collective hangover of BlackHat and DefCon finally subsides we've rounded up two of our first time attendees to recap! Join us with first time BlackHat attendee, Greg Porterfield, and first time DefCon attendee, Jamie Zolan, as they discuss tips for noobs, some of the coolest things they saw, and squash some of the rumors surrounding these two top cybersecurity conferences. Things Mentioned:· https://www.theregister.com/2022/08/25/north_korean_malware_black_hat/· https://www.bleepingcomputer.com/news/security/microsoft-disrupts-russian-hackers-operation-on-nato-targets/· https://lonelyhackers.club/post/defconguide/Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Keep up with Set Solutions· Twitter: https://twitter.com/setsolutionsinc· LinkedIn: https://www.linkedin.com/company/setsolutionsinc/· Instagram: https://www.instagram.com/set_solutions_inc/· YouTube: https://www.youtube.com/c/SetSolutions/· Facebook: https://www.facebook.com/SetSolutionsInc/Host: Michael Farnum · LinkedIn: https://www.linkedin.com/in/mfarnum/· Twitter: https://twitter.com/m1a1vetCo Host: Greg Porterfield· LinkedIn: https://www.linkedin.com/in/gporterfield/· Twitter: https://twitter.com/GregPorterfieldGuest: Jamie Zolan · LinkedIn: https://www.linkedin.com/in/jamiezolan/Produced by: Set SolutionsEdited by: Lauren Lynch
When it comes to your external API's obscurity cannot prevent a breach - it will merely delay one until a more determined attacker comes along. So, what can you do to protect your organization? On this episode Hacker, Educator, Speaker, Author, Podcast Host, and CyCognito Tech Evangelist Phillip Wylie joins us in the studio to further break down why obscurity is a poor defense strategy and how you can secure your API's through external attack surface management. Things Mentioned:· https://www.uscybersecurity.net/csmag/securing-apis-through-external-attack-surface-management-easm/· https://www.setsolutions.com/staffing/Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Keep up with Set Solutions· Twitter: https://twitter.com/setsolutionsinc· LinkedIn: https://www.linkedin.com/company/setsolutionsinc/· Instagram: https://www.instagram.com/set_solutions_inc/· YouTube: https://www.youtube.com/c/SetSolutions/· Facebook: https://www.facebook.com/SetSolutionsInc/Host: Michael Farnum · LinkedIn: https://www.linkedin.com/in/mfarnum/· Twitter: https://twitter.com/m1a1vetCo Host: Greg Porterfield· LinkedIn: https://www.linkedin.com/in/gporterfield/· Twitter: https://twitter.com/GregPorterfieldGuest: Phillip Wylie · LinkedIn: https://www.linkedin.com/in/phillipwylie/· Twitter: https://twitter.com/PhillipWylie· YouTube: https://www.youtube.com/c/PhillipWylie· Website: https://www.thehackermaker.com· Podcast: https://thehackerfactory.simplecast.com/Produced by: Set SolutionsEdited by: Lauren Lynch
There are a ton of tools and processes for figuring out a bill of materials, finding vulnerabilities, and building remediations for modern software. But doing all of that for firmware is a completely different story. And firmware security affects very critical pieces of your infrastructure. Today Michael and Greg are joined by NetRise Co-Founder and CEO Tom Pace to discuss the importance of firmware security and how you can start getting control of it.Things Mentioned: https://www.setsolutions.com/events/ https://www.darkreading.com/endpoint/post-macro-world-container-files-distribute-malware-replacementhttps://www.bleepingcomputer.com/news/security/lockbit-ransomware-abuses-windows-defender-to-load-cobalt-strike/ https://industrialcyber.co/regulation-standards-and-compliance/dhs-releases-cybersecurity-requirements-for-critical-pipeline-owners-operators/ Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Greg PorterfieldProduced by: Set SolutionsEdited by: Lauren Lynch
Michael and Greg are back after a short summer hiatus to discuss the latest report from the Kiteworks team around privacy and compliance. They're joined by Kiteworks CISO Frank Balonis who deep dives into getting executive buy in for privacy platforms, swaying your company's user base with quick wins, and protecting data flowing between third party applications. Things Mentioned:· https://www.setsolutions.com/events/· https://iapp.org/news/a/american-data-privacy-and-protection-act-heads-for-us-house-floor/· https://www.darkreading.com/vulnerabilities-threats/critical-bugs-atlassian-confluence-workspaces-open· https://info.kiteworks.com/report-2022-sensitive-content-communications-privacy-and-compliance-report?utm_campaign=2022%20Sensitive%20Content%20Communications%20Privacy%20and%20Compliance%20Report&utm_source=Set%20SolutionsDo you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Greg PorterfieldProduced by: Set SolutionsEdited by: Lauren LynchMusic Credit: Inspired by Kevin MacLeodLink: https://incompetech.filmmusic.io/song/3918-inspiredLicense: http://creativecommons.org/licenses/by/4.0/
This week Michael and our new cohost Greg are joined by Senior Security Consultant, Leo Magallon, to discuss the ever-expanding Identity in the Cloud. Listen in as Leo shares the origin of identity, how organizations currently defend their users, and where the technology is heading. Things Mentioned:https://www.mandiant.com/resources/unc3524-eye-spy-emailhttps://www.darkreading.com/operations/identity-and-access-management-looking-ahead-to-2021https://www.darkreading.com/edge-articles/why-we-need-to-consolidate-digital-identity-management-before-zero-trustDo you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Greg PorterfieldProduced by: Set SolutionsEdited by: Lauren Lynch
Cyber-attacks have evolved rapidly over the last decade and insurance companies have been forced to adapt quickly. What was once considered add on coverage now must be strictly reviewed as a breach can cost an insurer millions. Consequently, premiums are rising – leaving customers struggling to secure coverage. This week Michael is joined by CyberArk's VP of Sales Strategy and Development, David Adamczyk, and Dean and Draper Agent, Nolen Bucek, to discuss how the right tools and cybersecurity strategy can help you secure coverage, pass audits, and save on your premiums! Things Mentioned:· https://techmonitor.ai/technology/cybersecurity/is-revil-back-ransomware· https://www.darkreading.com/vulnerabilities-threats/pipedream-response-shows-best-case-for-industrial-security· https://www.deandraper.com· https://www.cyberark.com/cyber-insurance/ Do you have questions for the host? Reach out to us on our website at https://www.setsolutions.com/contact/Host: Michael Farnum Produced by: Set SolutionsEdited by: Lauren Lynch
This week we have not one but two special guests! Ron Eddings and Chris Cochran join us from Axonius to discuss the importance of proper asset management to GRC, the importance of strong fundamentals when it comes to cybersecurity, and their passion project: Hacker Valley Media! Things Mentioned:https://www.bleepingcomputer.com/news/security/github-can-now-alert-of-supply-chain-bugs-in-new-dependencies/https://www.bleepingcomputer.com/news/security/new-malware-targets-serverless-aws-lambda-with-cryptominers/https://hackervalley.comDo you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Host: Michael Farnum Produced by: Set SolutionsEdited by: Lauren Lynch
It's a tale as old as time – developers and security teams have historically butted heads over how security impacts application development and vice versa. But it doesn't have to be this way! This week host Michal Farnum is joined by Senior Security Consultant, Greg Porterfield, and Imperva's Director of Technology, Peter Klimek, to discuss how RASP (Runtime Application Self-Protection) can easily run inside your code and maybe even save your weekends. Things Mentioned:https://www.setsolutions.com/its-a-feature-gap/https://www.infosecurity-magazine.com/news/cadbury-warns-of-easter-egg-scam/https://jfrog.com/blog/large-scale-npm-attack-targets-azure-developers-with-malicious-packages/https://www.imperva.com/blog/imperva-protects-from-new-spring-framework-zero-day-vulnerabilities/Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Host: Michael Farnum Produced by: Set SolutionsEdited by: Lauren Lynch
On this week's show Senior Security Consultant, Greg Porterfield, and Senior Director of Applicant Security Products at Rapid7, Dan Kuykendall, join host Michael Farnum to discuss the “Categorical Blindspot” that is API's. Hacking them, securing them, and everything in between! Things Mentioned:· https://healthitsecurity.com/news/logan-health-faces-lawsuit-in-wake-of-hacking-incident· https://www.bleepingcomputer.com/news/security/revil-ransomware-member-extradited-to-us-to-stand-trial-for-kaseya-attack/· https://thehackernews.com/2022/03/russian-pushing-its-new-state-run-tls.html · https://apis.guru/graphql-voyager/ Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Host: Michael Farnum Produced by: Set SolutionsEdited by: Lauren Lynch
While technical building blocks are important to building your security operations center (SOC), some of the most important considerations are identifying what data sources you ingest and determining what kind of metrics indicate success. Today on the podcast Senior Security consultant, Paul Kay, and former Data Analytics practice manager, Brandt Varni, chat with Michael to discuss how to avoid wrong data, too little data, or too much data, and vanity metrics. Things Mentioned:https://www.wired.com/story/ukraine-it-army-russia-war-cyberattacks-ddos/https://www.darkreading.com/attacks-breaches/ransomware-trained-on-manufacturing-firms-led-cyberattacks-in-industrial-sectorhttps://www.theregister.com/2022/02/23/secureframe_security_compliance_investment/Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Host: Michael Farnum Produced by: Set SolutionsEdited by: Lauren Lynch
This week Michael and Hutch bring in Chief Strategy Officer, Brian Kenyon, of Island to discuss Islands launch and how they secured our most used tool – the browser. Things Mentioned:· https://www.dhs.gov/news/2022/02/03/dhs-launches-first-ever-cyber-safety-review-board· https://www.bleepingcomputer.com/news/security/mfa-adoption-pushes-phishing-actors-to-reverse-proxy-solutions/· https://www.island.io· https://www.youtube.com/watch?v=MYvm7XAZgb4 Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Justin HutchensProduced by: Set SolutionsEdited by: Lauren Lynch
Welcome back to our conversation about Operational Technology. Listen in as VP of Engineering Jonathan Townsend and Senior Solutions Architect Jarrod Cunningham discuss the processes of IT to OT security and how technology is adapting, making new and simpler ways to access your off-site devices. Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/ Hosts: Michael Farnum and Justin Hutchens Produced by: Set Solutions Edited by: Sydney Hirt Music Credit: Inspired by Kevin MacLeodLink: https://incompetech.filmmusic.io/song/3918-inspiredLicense: http://creativecommons.org/licenses/by/4.0/
We hope you NEVER need to work with Zachary Hinkel, but in the event of a breach he's just the person you want on your team. This week Michael and Hutch sit down with Zac to discuss his role as a Ransomware Negotiator, what the ransom process looks like once an organization is breached, and the folks behind the big business of Ransomware. Things Mentioned:· https://www.cnn.com/2021/10/14/media/mike-parson-st-louis-post-dispatch/index.html· https://www.cyberscoop.com/coalfire-security-pros-arrested-for-breaking-into-iowa-courthouse-are-still-bitter/· https://www.eff.org Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Justin HutchensProduced by: Set SolutionsEdited by: Lauren LynchMusic Credit: Inspired by Kevin MacLeodLink: https://incompetech.filmmusic.io/song/3918-inspiredLicense: http://creativecommons.org/licenses/by/4.0/
It's back! We're running another month long CTF and brought back last year's 4-time winner Cody Wheat to talk about how he got started, how CTF's are training the next generation of security professionals, and what to expect this year. Also joining us is Greg Porterfield to talk about some of the challenges the team put together this year. Things Mentioned:· https://cybersecurity-journal.com/2021/09/17/hackers-approach-unhappy-workers-to-be-accomplices/· https://threatpost.com/azure-zero-day-supply-chain/169508/· https:/www.bleepingcomputer.com/news/security/atandt-lost-200m-in-seven-years-to-illegal-phone-unlocking-scheme/· https://ctf.setsolutions.com· houstonseccon.org Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Justin HutchensProduced by: Set SolutionsEdited by: Sydney AndrusMusic Credit: Inspired by Kevin MacLeodLink: https://incompetech.filmmusic.io/song/3918-inspiredLicense: http://creativecommons.org/licenses/by/4.0/
After a short break for Black Hat and DefCon the guys are back to talk about a topic that isn't always fun but is very important to enterprise organizations – cybersecurity insurance. In this episode Nolen Bucek from Dean & Draper discusses what your policy can look like, what to look out for, and how outside events can affect your ability to secure proper coverage. Things Mentioned:· https://www.insurancejournal.com/news/national/2021/08/27/629122.htm· https://www.darkreading.com/vulnerabilities-threats/one-year-later-a-look-back-at-zerologon· https://www.nextgov.com/cybersecurity/2021/08/white-house-tasks-nist-producing-another-cybersecurity-framework/184868/· https://risky.bizDo you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Justin HutchensProduced by: Set SolutionsEdited by: Lauren LynchMusic Credit: Inspired by Kevin MacLeodLink: https://incompetech.filmmusic.io/song/3918-inspiredLicense: http://creativecommons.org/licenses/by/4.0/
This week Wilsonart CISO and Cybersecurity Awareness Evangelist Adam Traylor joins Michael and Hutch for our first live stream! Listen in as the trio discusses promoting cybersecurity best practices across your organization and some of the fun new tools available for training and monitoring. Things Mentioned:· https://www.securitymagazine.com/articles/95568-building-a-culture-of-cybersecurity-3-key-takeaways-from-the-2021-sans-report· https://www.bleepingcomputer.com/news/microsoft/new-petitpotam-attack-allows-take-over-of-windows-domains/· https://www.zdnet.com/article/kaseya-says-it-has-now-got-the-revil-ransomware-decryption-key-and-it-works/#ftag=RSSbaffb68· https://risky.biz· https://hackernoon.com/cybersec-games-part-i-backdoors-and-breaches-96393b0zDo you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Justin HutchensProduced by: Set SolutionsEdited by: Lauren Lynch
White Hat Hacker Len Noe is back to talk to Michael and Hutch about a fascinating topic – bio hacking. Sporting multiple implants himself Len discusses the many common (and some not so common) uses of microchip implants, the subculture behind them, and what the future holds.Things Mentioned:· https://thehackernews.com/2021/07/magecart-hackers-hide-stolen-credit.html· https://www.bleepingcomputer.com/news/security/cisa-disable-windows-print-spooler-on-servers-not-used-for-printing/· https://www.zdnet.com/article/the-chris-krebs-case-for-including-election-systems-as-critical-infrastructure/?&web_view=true· http://pegleg.orgDo you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Justin HutchensProduced by: Set SolutionsEdited by: Lauren LynchMusic Credit: Inspired by Kevin MacLeodLink: https://incompetech.filmmusic.io/song/3918-inspiredLicense: http://creativecommons.org/licenses/by/4.0/
This week looks a little different from our regular show as we take an internal conversation around securing Operational Technology from the Thunder Dome (AKA the Set Solutions slack channel) to the podcast. Listen in as VP of Engineering Jonathan Townsend and Senior Solutions Architect Jarrod Cunningham discuss the underutilized practice of OT security and why your organization should consider the investment. Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Justin HutchensProduced by: Set SolutionsEdited by: Lauren LynchMusic Credit: Inspired by Kevin MacLeodLink: https://incompetech.filmmusic.io/song/3918-inspiredLicense: http://creativecommons.org/licenses/by/4.0/
In Episode 30, Michael and Hutch sit down with Len Noe and Andy Thompson of CyberArk to discuss their upcoming virtual Attack and Defend event where they will go head-to-head in a real-world endpoint hacking and defense simulation.Registration Link: https://www.cyberark.com/attack-defend-cloud/Things Mentioned:https://www.bleepingcomputer.com/news/security/network-security-firm-coo-charged-with-medical-center-cyberattack/https://www.infosecurity-magazine.com/news/uk-us-cooperate-cybersecurity/ Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Justin HutchensProduced by: Set SolutionsEdited by: Sydney AndrusMusic Credit: Inspired by Kevin MacLeod Link: https://incompetech.filmmusic.io/song/3918-inspired License: http://creativecommons.org/licenses/by/4.0/
For this round of our Security Influencer Series Michael and Hutch are joined by John Kindervag, the man behind the Zero Trust methodology. Listen in as they discuss why this process – and not a singular tool – is important for your organization. Things Mentioned:· https://www.bleepingcomputer.com/news/security/ransomware-gangs-slow-decryptors-prompt-victims-to-seek-alternatives/· https://www.cnn.com/2021/05/28/tech/cybersecurity-labor-shortage/index.html· https://www.cbsnews.com/news/cybersecurity-job-openings-united-states/· https://www.bellingcat.com/news/2021/05/28/us-soldiers-expose-nuclear-weapons-secrets-via-flashcard-apps/Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Justin HutchensProduced by: Set SolutionsEdited by: Lauren LynchMusic Credit: Inspired by Kevin MacLeodLink: https://incompetech.filmmusic.io/song/3918-inspiredLicense: http://creativecommons.org/licenses/by/4.0/
Up next in our Security Influencer Series we have Phillip Wylie, the author of “The Pen Tester Blueprint”. Michael and Hutch chat with Phillip about his origin story and how anyone, even professional wrestlers, can get into cybersecurity. Things Mentioned:· https://www.bleepingcomputer.com/news/security/dod-expands-bug-disclosure-program-to-all-publicly-accessible-systems/· https://www.wired.com/story/colonial-pipeline-ransomware-payment/· https://krebsonsecurity.com/2021/05/try-this-one-weird-trick-russian-hackers-hate/· https://www.itspmagazine.com/the-hacker-factory-podcast· https://www.wiley.com/en-us/The+Pentester+BluePrint%3A+Starting+a+Career+as+an+Ethical+Hacker-p-9781119684305Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Justin HutchensProduced by: Set SolutionsEdited by: Lauren LynchMusic Credit: Inspired by Kevin MacLeodLink: https://incompetech.filmmusic.io/song/3918-inspiredLicense: http://creativecommons.org/licenses/by/4.0/
This week on the Podcast, Michael and Hutch sit down with Principal Security Consultant Jimmy Mejia to discuss his upcoming blog series on penetration testing techniques and methodologies. Listen in as the trio discusses why there is still confusion these days between a vulnerability assessment and a penetration test. And keep an eye out for the full series where Jimmy will cover the different types of pen tests available.Things Mentioned:https://www.thedailybeast.com/elderly-couple-uses-morse-code-to-escape-secure-assisted-living-facility-in-tennesseehttp://scmagazine.com/home/security-news/malware/standoff-with-researchers-may-emerge-as-github-floats-stricter-policies/https://www.bleepingcomputer.com/news/security/new-stealthy-linux-malware-used-to-backdoor-systems-for-years/Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Justin HutchensProduced by: Set SolutionsEdited by: Lauren LynchMusic Credit: Inspired by Kevin MacLeodLink: https://incompetech.filmmusic.io/song/3918-inspiredLicense: http://creativecommons.org/licenses/by/4.0/
There’s an easier way to build Splunk dashboards, and Service Delivery Manager Chuck Brown is here to help! This week on the podcast Michael and Hutch walk through Chucks latest demo and learn how the new cPanel feature can help optimize your Splunk environment. Things Mentioned:· https://www.bloomberg.com/news/articles/2021-04-14/nba-s-houston-rockets-face-cyber-attack-by-ransomware-group· https://www.tripwire.com/state-of-security/featured/white-house-plan-protect-critical-infrastructure-against-cyber-attacks/· https://www.justice.gov/usao-sdtx/pr/justice-department-announces-court-authorized-effort-disrupt-exploitation-microsoft· https://krebsonsecurity.com/2021/04/did-someone-at-the-commerce-dept-find-a-solarwinds-backdoor-in-aug-2020/· Raise Demo https://youtu.be/goC3xdG8rj4Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Justin HutchensProduced by: Set SolutionsEdited by: Lauren LynchMusic Credit: Inspired by Kevin MacLeodLink: https://incompetech.filmmusic.io/song/3918-inspiredLicense: http://creativecommons.org/licenses/by/4.0/
Up next in our Cybersecurity Influencer series we have the Co-Founder of the Security BSides Conference, Co-Host of the Security Voices podcast, and Tenable Community Advocate Jack Daniel! This week Michael and Hutch chat with Jack about how BSides came to be the global movement that it is today. Things Mentioned:· https://www.vice.com/en/article/n7vpaz/researcher-publishes-code-to-exploit-microsoft-exchange-vulnerabilities-on-github· https://thehill.com/policy/cybersecurity/546105-lack-of-cyber-funds-in-biden-spending-bill-raises-eyebrows· https://hbr.org/2021/03/how-to-measure-burnout-accurately-and-ethicallyDo you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Justin HutchensProduced by: Set SolutionsEdited by: Lauren LynchMusic Credit: Inspired by Kevin MacLeodLink: https://incompetech.filmmusic.io/song/3918-inspiredLicense: http://creativecommons.org/licenses/by/4.0/
Join Michael and Nick as they meet with Application Security pioneer Dan Kuykendall to discuss the history of the practice and what he predicts this field will see in the future. Things Mentioned:· https://www.macrumors.com/2021/03/15/duckduckgo-google-search-spying-on-users/· https://www.scmagazine.com/home/patch-management/microsoft-releases-one-click-mitigation-tool-for-exchange-serverDo you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Nick DiPasqualeProduced by: Set SolutionsEdited by: Lauren LynchMusic Credit: Inspired by Kevin MacLeodLink: https://incompetech.filmmusic.io/song/3918-inspiredLicense: http://creativecommons.org/licenses/by/4.0/
Senior Security Consultant Greg Porterfield joins Michael and Nick to discuss his upcoming series on combining his expertise in Data Analytics and his new found interest in penetration testing. Things Mentioned:· https://krebsonsecurity.com/2021/02/whats-most-interesting-about-the-florida-water-system-hack-that-we-heard-about-it-at-all/· https://www.bleepingcomputer.com/news/security/researcher-hacks-over-35-tech-firms-in-novel-supply-chain-attack/· https://www.usatoday.com/story/travel/news/2021/02/21/united-airlines-investigating-ted-cruzs-flight-information-leak/4533758001/· https://www.setsolutions.com/data-analytics-series-graphing-modem-data-for-fun/Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Nick DiPasqualeProduced by: Set SolutionsEdited by: Lauren LynchMusic Credit: Inspired by Kevin MacLeodLink: https://incompetech.filmmusic.io/song/3918-inspiredLicense: http://creativecommons.org/licenses/by/4.0/
Our hosts got some one on one time with Dr. Anton Chuvakin of Google Cloud to discuss his latest post on Context in Threat Detection. Things Mentioned:https://www.nbcnews.com/tech/security/florida-near-miss-cybersecurity-worst-case-scenario-n1257091https://cbs12.com/news/local/ag-warns-people-not-to-post-vaccination-cards-onlinehttps://medium.com/anton-on-security/role-of-context-in-threat-detection-f7076e71f206Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Nick DiPasqualeProduced by: Set SolutionsEdited by: Lauren LynchMusic Credit: Inspired by Kevin MacLeodLink: https://incompetech.filmmusic.io/song/3918-inspiredLicense: http://creativecommons.org/licenses/by/4.0/
One of our favorite ethical hackers is back to discuss GRC Tenets, the Set Solutions maturity model, and much more! Things Mentioned:· https://www.darkreading.com/endpoint/sonicwall-is-latest-security-vendor-to-disclose-cyberattack/d/d-id/1339972· https://techwireasia.com/2021/01/qr-codes-are-back-but-are-they-a-cybersecurity-threat/· https://labs.detectify.com/2021/01/15/how-i-hijacked-the-top-level-domain-of-a-sovereign-state/Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Nick DiPasqualeProduced by: Set SolutionsEdited by: Lauren LynchMusic Credit: Inspired by Kevin MacLeodLink: https://incompetech.filmmusic.io/song/3918-inspiredLicense: http://creativecommons.org/licenses/by/4.0/
Michael and Nick are back to kick off a brand-new series featuring Cybersecurity Influencers! First up is Ron Gula, President at Gula Tech Adventures which focuses on cyber technology, cyber policy and recruiting more people to the cyber workforce. Check out their conversation to learn more about Cybersecurity startups, non-profits, and solving the cybersecurity skills gap. Things Mentioned:https://www.axios.com/pelosi-laptop-stolen-capitol-riot-268f364b-8695-4249-b0f3-0f28eb99ab6e.htmlhttps://portswigger.net/daily-swig/nsa-advises-defense-national-security-supply-chain-on-replacing-deprecated-encryption-protocolshttps://www.gula.techDo you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Nick DiPasqualeProduced by: Set SolutionsEdited by: Lauren LynchMusic Credit: Inspired by Kevin MacLeodLink: https://incompetech.filmmusic.io/song/3918-inspiredLicense: http://creativecommons.org/licenses/by/4.0/
It’s time to say “good riddance” to 2020 and look towards a shiny new year! In our season 1 finale Michael and Nick discuss some 2021 cybersecurity predictions from the Set Solutions team and toss in a few of their own as well.Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Nick DiPasqualeProduced by: Set SolutionsEdited by: Lauren Lynch
Did you know that in addition to cybersecurity products and staffing Set Solutions also offers professional services? This week Michael and Nick chat with Director of Professional Services, Lance Grover, to discuss what you should look for in any professional services engagement and what sets the Set Solutions team apart. Things Mentioned:· https://www.setsolutions.com/graphing-modem-data-for-fun-part-6/https://www.setsolutions.com/common-challenges-of-data-protection-programs/· https://www.setsolutions.com/services/amazon-web-services-aws/· https://www.forbes.com/sites/theyec/2020/11/25/why-data-protection-and-cybersecurity-cant-be-separate-functions/?sh=3cb2831217cc· https://www.darkreading.com/vulnerabilities---threats/failing-toward-zero-why-your-security-needs-to-fail-to-get-better/a/d-id/1339403· https://www.forbes.com/sites/forbesbusinesscouncil/2020/11/25/eight-steps-to-building-a-human-centered-security-culture Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Nick DiPasqualeProduced by: Set SolutionsEdited by: Lauren LynchMusic Credit: Inspired by Kevin MacLeodLink: https://incompetech.filmmusic.io/song/3918-inspiredLicense: http://creativecommons.org/licenses/by/4.0/
Michael and Nick are joined by a special guest this week – Set Solutions Director of Talent Acquisition Shera Southerland! In this episode the team talks about everything from the technical skills gap to what to wear for a zoom interview. You don’t want to miss it!Things Mentioned:· https://www.cnbc.com/2020/09/05/cyber-security-workers-in-demand.html· https://www.bleepingcomputer.com/news/security/capcom-confirms-data-breach-after-gamers-data-stolen-in-cyberattack/· https://breakingdefense.com/2020/11/starting-dec-1-cybersecurity-is-no-longer-optional/Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Nick DiPasqualeProduced by: Set SolutionsEdited by: Lauren LynchMusic Credit: Inspired by Kevin MacLeodLink: https://incompetech.filmmusic.io/song/3918-inspiredLicense: http://creativecommons.org/licenses/by/4.0/
On this episode Michael and Nick sit down with Principal Security Strategist Jesika McEvoy in preparation for Rapid7’s upcoming Tech Thursday with Set Solutions. Listen in as they discuss risk, reporting, and actionable insights in vulnerability data!Things Mentioned:· https://www.securitymagazine.com/articles/93501-enterprise-security-teams-struggle-with-the-growing-pace-volume-and-sophistication-of-cyberattacks· https://www.darkreading.com/threat-intelligence/windows-zero-day-used-with-chrome-flaw-in-targeted-attacks/d/d-id/1339350· https://threatpost.com/lax-security-smart-irrigation-attack/160625/Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Nick DiPasqualeProduced by: Set SolutionsEdited by: Lauren LynchMusic Credit: Inspired by Kevin MacLeodLink: https://incompetech.filmmusic.io/song/3918-inspiredLicense: http://creativecommons.org/licenses/by/4.0/
On this episode Michael and Nick chat with Corey Bodzin, CTO of deepwatch, about all of the latest developments with the deepwatch team including their newest tool, Lens Score, and how essential SecOps maturity is to any organization. Things Mentioned:https://it.slashdot.org/story/20/10/18/2321208/three-npm-packages-opened-remote-access-shells-on-linux-and-windows-systemshttps://www.bleepingcomputer.com/news/security/fbi-warns-of-newly-registered-domains-spoofing-us-census-bureau/https://www.engadget.com/broadvoice-voicemail-data-leak-211913573.htmlhttps://www.deepwatch.com/lens-score/Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Nick DiPasqualeProduced by: Set SolutionsEdited by: Lauren LynchMusic Credit: Inspired by Kevin MacLeodLink: https://incompetech.filmmusic.io/song/3918-inspiredLicense: http://creativecommons.org/licenses/by/4.0/
This week Michael and Nick sit down with one of Set Solutions Cybersecurity experts – Senior Security Solutions Architect Chandresh Patel – to discuss his upcoming series on vulnerability management. Things Mentioned:https://us-cert.cisa.gov/ncas/alerts/aa20-133ahttps://www.securityweek.com/cisco-ordered-pay-19-billion-cybersecurity-patent-infringement-casehttps://www.darkreading.com/vulnerabilities---threats/new-research-finds-bugs-in-every-anti-malware-product-tested/d/d-id/1339101Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Nick DiPasqualeProduced by: Set SolutionsEdited by: Lauren LynchMusic Credit: Inspired by Kevin MacLeodLink: https://incompetech.filmmusic.io/song/3918-inspiredLicense: http://creativecommons.org/licenses/by/4.0/
Did you know October is Cybersecurity awareness month? To celebrate this year Set Solutions is running a month long capture the flag event. This week Michael and Nick sit down with a member of the CTF team (John Dearman) to discuss this event and the role it plays in cybersecurity. Things Mentioned:https://threatpost.com/tik-tok-ban-security-experts dangers/159362/https://krebsonsecurity.com/2020/09/chinese-antivirus-firm-was-part-of-apt41-supply-chain-attack/https://www.zdnet.com/article/mitre-releases-emulation-plan-for-fin6-hacking-group-more-to-follow/https://www.forbes.com/sites/forbestechcouncil/2019/11/22/can-ctfs-help-close-the-cybersecurity-skills-gap/Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Nick DiPasqualeProduced by: Set SolutionsEdited by: Lauren LynchMusic Credit: Inspired by Kevin MacLeodLink: https://incompetech.filmmusic.io/song/3918-inspiredLicense: http://creativecommons.org/licenses/by/4.0/
This week Michael and Nick chat with members of the Set Solutions services team about Identity Management, our internal CAVE tool, and the upcoming lunch and learn where you can learn more! Things Mentioned:· https://www.darkreading.com/cloud/why-kubernetes-clusters-are-intrinsically-insecure-(and-what-to-do-about-them)/a/d-id/1338747· https://thehackernews.com/2020/09/cloud-monitoring.html· https://arstechnica.com/tech-policy/2020/09/portland-adopts-strictest-facial-recognition-ban-in-nation-to-date/Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Nick DiPasqualeProduced by: Set SolutionsEdited by: Lauren LynchMusic Credit: Inspired by Kevin MacLeodLink: https://incompetech.filmmusic.io/song/3918-inspiredLicense: http://creativecommons.org/licenses/by/4.0/
This week Michael and Nick chat with Senior Security Consultant Daniel Thrasher to discuss malicious AMI’s, NIST Zero Trust architecture, and Daniel’s upcoming video series: “Coding your Cloud Move”Things Mentioned:· https://threatpost.com/malicious-aws-community-amis/158555/· https://krebsonsecurity.com/2020/08/microsoft-put-off-fixing-zero-day-for-2-years/· https://www.securitymagazine.com/articles/93067-nist-unveils-zero-trust-architecture· https://aws.amazon.com/blogs/security/privacy-conscious-cloud-migrations-mapping-aws-cloud-adoption-framework-to-nist-privacy-framework/Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Nick DiPasqualeProduced by: Set SolutionsEdited by: Lauren LynchMusic Credit: Inspired by Kevin MacLeodLink: https://incompetech.filmmusic.io/song/3918-inspiredLicense: http://creativecommons.org/licenses/by/4.0/
In this episode Michael and Nick chat with Milton Keath, Senior Solution Architect at GuardiCore, about the concept of Zero Trust, the role of Micro-Segmentation, and the importance of standard security protocols. Things Mentioned:· https://www.engadget.com/garmin-cyber-attack-ransomware-payment-180211805.html· https://threatpost.com/hackers-dump-20gb-of-intels-confidential-data-online/158178/· https://www.cyberscoop.com/trend-micro-industrial-protocol-gateways-black-hat/Do you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Nick DiPasqualeProduced by: Set SolutionsEdited by: Lauren LynchMusic Credit: Inspired by Kevin MacLeodLink: https://incompetech.filmmusic.io/song/3918-inspiredLicense: http://creativecommons.org/licenses/by/4.0/
In this episode Michael and Nick sit down with Contrast Security Co-Founder and CTO Jeff Williams to discuss legacy, modern, and future Application Security.Things Mentioned:· https://www.contrastsecurity.com/appsec-observability-report-promo· https://threatpost.com/leak-exposes-private-data-of-genealogy-service-users/157612/· https://www.infosecurity-magazine.com/opinions/howto-security-expertise-developers/ by Dan CornellDo you have questions for the hosts? Reach out to us on our website at https://www.setsolutions.com/contact/Hosts: Michael Farnum and Nick DiPasqualeProduced by: Set SolutionsEdited by: Lauren LynchMusic Credit: Inspired by Kevin MacLeodLink: https://incompetech.filmmusic.io/song/3918-inspiredLicense: http://creativecommons.org/licenses/by/4.0/