Using cyber insurance to run virtuous circles around cyber risk

Computer Fraud & Security Magazine | October 2018

By Dr. Mike Lloyd, Chief Technology Officer

In 2016, the Ponemon Institute, which conducts independent research on privacy, data protection and information security policy, concluded that each of the 383 companies it surveyed had a “26% probability of a material data breach involving 10,000 lost or stolen records” within the “next 24 months”. Work this out over the long term, not for two years but for the projected life of your business and you must accept the certainty of data breach just as you accept the certainty of death and taxes. Breaches will happen. They will happen to you.

Cyber Hygiene And Digital Resilience To Withstand A Cyber Attack

ITSP Magazine | October 25, 2018

By Wayne Lloyd, RedSeal Federal CTO

After both the first and second Gulf wars, nation states such as North Korea, Iran, China and others came to the same conclusion: under no circumstances get into a shooting war with the United States military. The sole superpower in the world had a military so advanced and superior on the battlefield it left little doubt about the outcome.

CDM Designed to Help Federal Agencies Understand Risk Posture and Become Digitally Resilient

Government Technology Insider | October 24, 2018

The goal of the Continuous Diagnostics and Mitigation (CDM) Program is for all civilian agencies included in the program under the Chief Financial Officers’ (CFO) Act to feed data to the federal government-wide cybersecurity threat dashboard. With each individual agency’s information compiled, the dashboard consolidates threat information from individual agency feeds to give an overall understanding of the cyber risks facing civilian agencies and enables them to prioritize the most critical issues. 

Is AI Resilient Enough for Security?

SIGNAL Magazine | October 22, 2018

By Dr. Mike Lloyd, RedSeal CTO

Machines need to be hard to fool and reliable under pressure.

Artificial intelligence can be surprisingly fragile. This is especially true in cybersecurity, where AI is touted as the solution to our chronic staffing shortage.

It seems logical. Cybersecurity is awash in data, as our sensors pump facts into our data lakes at staggering rates, while wily adversaries have learned how to hide in plain sight. We have to filter the signal from all that noise. Security has the trifecta of too few people, too much data and a need to find things in that vast data lake. This sounds ideal for AI.

Resilient regulation can help end the tech-consumer stalemate

The Hill | October 21, 2018

By Ray Rothrock, RedSeal CEO

The reason for the absence of meaningful dialogue and meaningful movement is that the two sides persist in choosing the wrong adjectives. They argue over preemptive federal legislation versus state legislation. They fight over tough legislation versus soft legislation.

What they should do is discard all of these modifiers and instead embrace, together, just one type of legislation: resilientWe need privacy regulation that promotes the resilience of data privacy and security. And we need it whether we run Google and Facebook or use Google and Facebook.

FICO & US Chamber of Commerce Score Cyber-Risk Across 10 Sector

Dark Reading | October 16, 2018

Media, telecom, and technology firms are far more likely to experience a data breach in the near future than organizations in sectors including energy, construction, and transportation.

A score “taken from the outside looking in is similar to rating the fire risk to a building based on a photograph from across the street,” says Mike Lloyd, CTO of RedSeal. “You can, of course, establish some important things about the quality of a building from a photograph, but it’s no substitute for really being able to inspect it from the inside.”

If You Protect Everything, Are You Protecting Anything?

Government Technology Insider | October 12, 2018

With Nate Cash, Senior Network Security Engineer

For decades, cybersecurity professionals have been tasked with protecting organizational IT assets, whether hardware, software, systems, or data. But have they been setting priorities for cybersecurity?

This is a monumental task, especially when the technology environment not only continues to change but is accelerating – just look at the spread of the Internet of Things. IT folks may be told to protect “everything,” but they know it’s an impossible task. They don’t have unlimited resources, after all.

In particular, organizations suffer from a skills gap.

DriveScale TechNow Podcast with Ray Rothrock

DriveScale TechNow Podcast | October 3, 2018

With Ray Rothrock, RedSeal CEO

In this edition of TechNow with Tom Lyon, Tom talks to Ray Rothrock, venture capitalist, nuclear engineer, cyber security expert, and current CEO of RedSeal, a firm that helps organizations quantify their digital resilience.

RedSeal Named 2018 Cloud Security Excellence Award Winner

TMC | October 1, 2018

TMC’s Cloud Computing Magazine has named RedSeal as a winner of their 2018 Cloud Computing Security Excellence Awards. The awards honor solutions in two categories: those that most effectively leverage cloud platforms to deliver network security, and those providing security for cloud applications.

Cloud Computing magazine is the industry’s definitive source for all things cloud – from public, community, hybrid and private cloud to security and business continuity, and everything in between.

Cybersecurity: Duck and Cover or Stand Up and Do Business?

CEOWORLD | October 1, 2018

By Ray Rothrock, RedSeal CEO

Cybersecurity isn’t working today.  In 2016, the Ponemon Institute reported that each of the 383 companies it surveyed had a “26 percent probability of a material data breach involving ten thousand lost or stolen records” within the “next twenty-four months.” Take this beyond two years—say to the projected life of your business—and you must accept the certainty of data breach. If cybersecurity were working, that certainty would not exist.

What has gone wrong with cybersecurity?

The exponential development of digital technology has left it in the cyber dust.