Data Leaks Evolving into Weapons of Business Destruction

CSO and IT WORLD | October 3, 2016

Most of the recent data breaches involve customer information such as user names and passwords, credit card numbers, and medical histories. The companies hacked are hurt — they have to contact victims, pay for credit monitoring services and fines, and may lose customers, brand reputation, and market value — but that is collateral damage.

Or it has been.

Security Industry Reactions to the Yahoo! Breach

THE CYBER WIRE | September 28. 2016

Last week’s disclosure by Yahoo! that somewhat more than 500 million customers’ credentials had been compromised in a breach dating back to 2014 has prompted widespread reaction from industry experts. The incident has implications for Yahoo!’s consumer trust; it also is seen as likely to affect, adversely, the soft landing the company anticipated in Verizon’s proposed acquisition of Yahoo!’s core assets.

Micro-Segmentation: Good or bad?

COMPUTING | 27 September 2016

Mike Lloyd, CTO at RedSeal, argues that more granular control is a good thing, but it’s easier said than done.

There’s a lot going on in virtual data centres. In security, we’re hearing many variations of the term “micro-segmentation”. (It originated from VMware, but has been adopted by other players, some of them adding spin.)

Yahoo-Verizon Deal May Be Complicated By Historic Hack

CNBC | September 22, 2016

Yahoo faces fallout from lawmakers, users and even Verizon following what could be the biggest data breach in history.

Financial Sector Offers Model for Cybersecurity Sharing

SIGNAL | September 15, 2016

By J. Wayne Lloyd

When it comes to cybersecurity, I have heard many people express consternation and wonderment as to why the government cannot protect the Internet. It boils down to two things: No authorization, and officials only have visibility into a scant number of networks under their control.

To Maintain Democracy, Digital Networks Must Be Improved

ThirdCertainty | September 13, 2016

Automation, segmentation and continuous oversight of voting systems will strengthen trust in government

By Ray Rothrock, RedSeal CEO

As the presidential election enters its home stretch, the Democratic National Convention cyber hack and issues with local voting machines have made cybersecurity part of the election story. After the election, I fully expect an accusation from the loser about electronic voter fraud, which will cast doubt on the most important element in any election: Trust.

Can Cybersecurity Save the November Elections?

CSO | September 6, 2016

The Federal Bureau of Investigation’s disclosure earlier this month that foreign hackers had infiltrated voter registration systems in Illinois and Arizona came as no surprise to some cybersecurity experts.

Digital Resilience: A Better Way to Cybersecurity

CIOReview | September 12, 2016

By Ray Rothrock, CEO, RedSeal

Who says prevention is better than cure? Since the advent of networks and hacking, prevention, coupled with detection, has been the primary cyber strategy to counter cyberattack. But, with the exponential increase in the pace and complexity of digital connections, and sophistication of the attackers, this approach is falling short as the breaches at JP Morgan, IRS, Target and UCLA Health so clearly demonstrated.

RedSeal CEO Ray Rothrock Shares Insights on Mad Money with Jim Cramer

MAD MONEY WITH JIM CRAMER | August 25, 2016

Our CEO Ray Rothrock shared the latest on cybersecurity as a guest on Mad Money with Jim Cramer (CNBC) today, covering a variety of topics – from why perfect firewall management doesn’t provide perfect protection, to the risk of a hacking attack on electrical grids and nuclear power plants.

A Cybersecurity Seal of Approval is Not Enough

IDG CONNECT | August 16, 2016

This is a contributed piece by Dr. Mike Lloyd, Chief Technology Officer of RedSeal

Cyberthreats continue to dominate the headlines and wreak havoc on corporate networks. There are now nearly one million new malware threats released every single day, according to recent reports. In a bid to stem the tide, several groups have announced programs to rate the cybersecurity of network-connectable products and systems.