Julie Parrish of RedSeal: “There is an awful lot that will happen outside of your control; how you react is crucial”

Authority Magazine | September 10, 2020

As a part of our series about strong women leaders, I had the pleasure of interviewing Julie Parrish.

Deepfakes and deep fraud: The new security challenge of misinformation and impersonation

IDG Connect | September 1, 2020

Deepfakes, until recently, have just been an amusing part of the internet. Videos emerged of various celebrities in the wrong movie or interview, some were quite poorly made but others were almost like the real thing. They were entertaining and funny; not really given much thought and left to a corner of the internet. However, it was not long before politicians were the next target, videos emerging of significant figures like Barack Obama, Nancy Pelosi and Donald Trump.

It was at this point that some serious concerns started to develop over the security implications of this technology.

Don’t believe the hype: AI is no silver bullet

Computer Weekly | August 7, 2020

We want to believe AI will revolutionise cyber security, and we’re not necessarily wrong, but it’s time for a reality check

Chief information security officers (CISOs) looking for new security partners must therefore be pragmatic when assessing what’s out there. AI is helpful, in limited use cases, to take the strain off stretched security teams, but its algorithms still have great difficulty recognising unknown attacks. It’s time for a reality check.

Podcast | Cybersecurity in the Pandemic: How Can We Protect Ourselves?

Supply Chain Brain | July 31, 2020

Far from slowing down cyber thieves, the coronavirus pandemic presents them with ever greater opportunities to hack into networks. You don’t have to be a cynic to expect cyber thieves to take advantage of a global health crisis. From their perspective, the time is ideal. In the confusion surrounding the lockdown, companies might indeed be letting down their guard. And employees working from home present a whole new range of possible network vulnerabilities.

On this episode, we learn about the heightened risk of cyber crime from an expert in the field: Ray Rothrock, executive chairman of RedSeal, a cyber terrain mapping company. He offers valuable advice on shoring up networks in this critical time, and explains what it means to operate in a “zero trust” environment.

3 Ways Social Distancing Can Strengthen your Network

Dark Reading | July 31, 2020

Security teams can learn a lot from the current pandemic to make modern hybrid business networks stronger and more resilient. Here’s how.

We all know the role social distancing plays in combating COVID-19. Most people also understand why this is our primary line of defense; it’s about slowing down the progress of the disease to prevent our healthcare defenders from being overwhelmed. Today’s network security teams live in a similar shifting landscape and need to apply these same ideas to avoid getting overwhelmed. Here are three tactics to help “social distance” your network.

Tactic 1: Focus on Flare-ups

30 Notable IT Executive Moves: June 2020

CRN | July 14, 2020

Bryan Barney

RedSeal hired the former head of Symantec’s Enterprise Security Group Bryan Barney as its new CEO to drive adoption of the company’s platform among government agencies and Global 2000 companies.

Barney is replacing Ray Rothrock, who had led RedSeal since 2014 and will now transition into the role of executive chairman.

Barney most recently ran Symantec’s Enterprise Security Group from July 2017 to September 2019, where he oversaw the company’s endpoint security, endpoint detection and response, data loss prevention, email security, IoT and cloud workload protection tools. He left Symantec just a month after Broadcom announced plans to acquire the company’s Enterprise Security business for $10.7 billion.

Protect Your Business And Your Remote Staff From Hackers With These 16 Strategies

Forbes Technology Council |  July 7, 2020

9. Double-check remote access.

It’s time to double-check the security of your remote access. The rapid shift to working from home meant fast-paced change with intense pressure to get things working immediately. This is a perfect recipe for new security gaps and oversights. Map your network and make sure you’ve only opened up the access you wanted and nothing more. – Mike Lloyd, RedSeal

13 Things Tech Leaders Need To Do To Prepare For Decentralization

Forbes Technology Council |  June 30, 2020

3. Remain in control with automation.

“Decentralized” should not mean “out of control.” You still need controls between your crown jewels and your users (both wanted and unexpected). The old medieval castle model didn’t work, but this means there are more perimeters everywhere now. You need automation to keep up and verify you’re only allowing the right access. You’re the mayor of a digital city, not the guard of a stone fort. – Mike Lloyd, RedSeal

The Security Interviews: What CISOs can learn from Covid-19

Computer Weekly |  June 30, 2020

Mike Lloyd, CTO at Redseal, holds 21 cyber security patents and a PhD in stochastic epidemic modelling from Heriot-Watt University in Edinburgh, so is probably the man to talk to when it comes to cyber security in the world of Covid-19.

More than three months into the global Covid-19 coronavirus pandemic, we have all become familiar with the advice on how not to catch this mysterious and horrible disease, which some people seem to be able to shake off with ease, but for thousands of other survivors now appears to have life-changing consequences.

Digital Preparedness for Health Care

Health Tech Digital | June 23, 2020

Being prepared for the unknown is as important to the digital side of healthcare as it is to the medical side. Both require knowing your resources, preparing for likely scenarios and following good hygiene practices for advanced planning, health maintenance, and rapid intervention. There are established protocols in medicine and for digital infrastructure. The Center for Internet Security (CIS) publishes Critical Security Controls, which serve as a widely agreed upon set of solid, proven approaches to cyber readiness.

These start at the most basic level – understanding your inventory.