Entries by Keith Do

The smart tech threat to CEOs

TechRadar | November 7, 2019

The cybersecurity industry talks a lot about the importance of “board-level buy-in” for projects and a security-by-design culture led from the “top down”. What does that actually mean? It means CEOs and senior managers who “get” security: leaders who know that security done right can be a competitive differentiator and […]

RedSeal Expands Hybrid Network Modeling Capabilities to Include Google Cloud Platform

Organizations can see access and prioritize vulnerabilities across network environments

SAN JOSE, Calif. — Nov. 5, 2019 — Today RedSeal added support for Google Cloud Platform to expand customers’ continuous network understanding across their entire infrastructure and cyber terrain.

With the addition of Google Cloud Platform, RedSeal consolidates network data from the most prevalent […]

Book Review: Digital Resilience, by Ray Rothrock

Tag Cyber | November 1, 2019

By Edward Amoroso

There was a time in America, decades ago, when one would feel obliged to possess a good working knowledge of science and technology to be considered a well-rounded adult. This is how physicists like Einstein became mainstream celebrities, attending film openings with Charlie Chaplin, and being […]

Cyber Attacks Are Inevitable. How Do We Protect Ourselves?

Supply Chain Brain | November 1, 2019

RedSeal CEO Ray Rothrock joins Bob Bowman, managing editor of SupplyChainBrain, to discuss cybersecurity and protecting ourselves with resilience.

The SupplyChainBrain Podcast features in-depth conversations with industry practitioners, academics, consultants and other experts on every aspect of supply-chain management and international trade.

Cybersecurity: Ray Rothrock – Prepare, Protect, Respond

Public Utilities Fortnightly | November 1, 2019

RedSeal CEO Ray Rothrock was interviewed in a Cybersecurity Special Feature for Fortnightly Magazine, and discusses his security recommendations for the leaders of utilities and regulators, segmentation, NERC CIP compliance and more.

Hackers access Bed Bath & Beyond customer data

Digital Commerce 360 | October 31, 2019

For a shopper who was impacted, she should ensure she doesn’t use the same password for her Bed Bath & Beyond account elsewhere. In fact, not reusing passwords is one way consumers can protect themselves from fraud, says Mike Lloyd, chief technology officer from cyber security firm RedSeal Inc.

“It’s […]

What Do You Do When You Can’t Patch Your IoT Endpoints?

Dark Reading | October 29, 2019

Question: What do you do when you can’t patch your IoT endpoints?

Dr. Mike Lloyd, CTO of RedSeal: Internet of Things devices are great because they aren’t as complicated as phones, laptops, or servers. General-purpose computers cause headaches. Unfortunately for security, IoT devices are also a curse for the […]

7 Technology Books Every Entrepreneur Should Read

Forbes | October 8, 2019

Malware, ransomeware, phishing attacks, viruses…are just some of the cyberthreats facing society. And they are getting more destructive.

What to do? Well, Ray Rothrock–who is a venture capitalist and is on the board of Check Point Software–has some solid answers. In his book, he goes over key areas like assessing […]

RedSeal Appoints Greg Straughn as Chief Financial Officer

SAN JOSE, Calif. — Oct. 8, 2019 — RedSeal today announced the appointment of Greg Straughn as its chief financial officer (CFO). Following Symphony Technology Group’s equity investment in RedSeal earlier this year, Straughn will help drive RedSeal’s rapid growth as organizations increasingly prioritize digital resilience as the objective for their cybersecurity strategy.

RedSeal’s cyber risk […]

Back to Basics: Why Asset Inventories are Key to Cyber Security

TAG Cyber | October 4, 2019

During a recent call, RedSeal’s Chief Product Officer, Kurt Van Etten, referenced an enterprise challenge that is too familiar. He shared with Ed Amoroso and me that maintaining and understanding one’s network asset inventory, both hardware and software, is the key to maintaining a strong cyber security program. It’s […]