Can a Non-Tech Manager Effectively Oversee Tech Pros?

DICE | April 14, 2017

Featuring Kurt Van Etten, RedSeal VP of Product Management

A manager is a worker with ambition who seized greater responsibility. But as the old saying goes, many manage to rise above their abilities, and attract reputations for uncertain guidance, indecision, and de-motivation.

It doesn’t have to be this way.

Putting the right person in the right job is the most important task that many companies screw up. A bad hire is bad enough, but the problem compounds when that bad hire is a manager—and the problem may scale up exponentially when you have an IT-oriented unit answering to a non-tech manager.

Banks Must Focus More on Cyber-Risk

DARK READING | April 5, 2017

By Dr. Mike Lloyd, RedSeal CTO

In late 2016, just after the distributed denial-of-service attack on the DNS infrastructure, I sat in my hotel room staring at a cryptic URL error on my laptop after attempting to buy a train ticket, wondering what it meant. Was my credit card compromised? Did I have a ticket? Should I do anything to protect my identity and financial security?

Every day, millions of Americans conduct billions of digital financial transactions with the corner grocery store, online retailers, and banks. We buy things and pay for them; we pay rent, credit card, and utility bills; and we scan smartphone screens at payment readers. Online financial interactions are continuous, intertwined, and essential to everyday life. They are also under ever-more threats from cyberattack. What can be done to defend against the constant barrage of successful exploits?

Security At Its Boiling Point

Channel Post | March 27, 2017

Cyber-crime is not a new phenomenon and it has gained momentum in recent years leading to more cyber-attacks on businesses, government establishments and other entities, leaving a trail of destruction in its wake. Over the last few years, the evolving threat climate has led to an increase in security spending. Enterprises are also transforming their security spending strategy in 2017, moving away from prevention-only approaches to focus more on detection and response. According to Gartner, spending on enhancing detection and response capabilities is expected to be a key priority for security buyers through 2020.

Negative Unemployment: That Giant Sucking Sound In Security

FORBES | March 21, 2017

By Dr. Mike Lloyd, RedSeal CTO

Businesses everywhere are facing the fact: the security talent pool is dry. I spoke to a manager recently who had hired a security analyst after eight months of searching. Each month he had reduced the requirements and increased the salary. Needless to say, in the end, he was getting less than he wanted for a lot more money. If you are a security professional, this seems great – we have one of the few jobs that are not about to be replaced with automation, and there’s no end in sight to the skills shortage.

But if we take a wider view, this is a big economic problem. Security work is either not getting done, or is being done by people who lack the background or aptitude.

Trump’s Budget Proposal to Significantly Boost Cybersecurity Funding

SIGNAL | March 16, 2017

The White House’s first federal budget blueprint unveiled Thursday seeks to fund the nation’s cybersecurity efforts by boosting budgets of the U.S. Defense Department and Department of Homeland Security—an initiative officials say will guard against the magnified threat landscape that is only getting worse.

The budget seeks $1.5 billion for the DHS that will help the government modernize federal computer networks that “can no longer sustain themselves,” White House homeland security adviser Thomas Bossert said a day earlier during Cyber Disrupt 2017, an event hosted by the Center for Strategic and International Studies, or CSIS.

Nine Ways To Protect Your Technology Company From DDoS Attacks

FORBES | March 16, 2017

DDoS attacks can wreak havoc on your company’s efficiency if you’re not careful. The Mirai botnet — malware that can be used for large-scale network attacks — can often go undetected due to common oversights and lack of preparation. It may be daunting to think about how IoT devices that make your company run smoothly can be used against you; however, it doesn’t take much time to set up multiple precautions to prevent it.

Below, executives from Forbes Technology Council highlight simple and cost-effective ways that you can safeguard your company from baleful botnets.

 

DOJ Indicts Suspected Yahoo Hackers From Russia

SEARCH SECURITY  and TECH TARGET | March 15, 2017 

The U.S. Department of Justice indicted four defendants accused of being the Yahoo hackers behind the breach of 500 million user accounts in 2014.

Three of the four defendants are Russian nationals — Dmitry Aleksandrovich Dokuchaev, Igor Anatolyevich Sushchin and Alexsey Alexseyevich Belan. Dokuchaev and Sushchin are officers of the Russian Federal Security Service (FSB), which is an intelligence agency similar to the CIA, while Belan is on the list of most-wanted cybercriminals and has been charged by the DOJ twice before. The final man indicted, Karim Baratov, is a Kazakh national and was the only one to be arrested. He was arrested in Canada where he is a resident; the three others are in Russia, and extradition is unclear.

Cyber Rule Could Quell the Urge to Merge for Government Contractors

SIGNAL | March 10, 2017

A revised NIST guideline raises the risk profile of M&A deals and presents challenges.

Do you work for a cyber company with federal government contracts? If so, hold onto your hat, because $210 billion in government information technology contracts will expire this year and be re-competed.

Federal IT security spending will continue to grow between 2016 and 2021, despite a relatively flat IT market, according to research firm Deltek. The bottom line: More money will be spread out over fewer contracts. This contract streamlining could mean big changes for the industry. “Consolidating contracting into fewer contracts will heighten competition,” reads a portion of the Deltek report. It also could trigger a wave of mergers and acquisitions as competitors expand their in-house capabilities.

People, Capital and Continuous Monitoring

MIDDLE MARKET EXECUTIVE | March 7, 2017

With Ray Rothrock, RedSeal Chief Executive Officer

MME: What are your priorities when it comes to growing this middle market business over the next 12 months?

“My job is to resource the company, people and capital, and maybe technology if that’s needed, but it’s mostly people because my priority is to grow this business globally as fast as I can, point one. Point two, we have a database and we’re doing a full conversion of that database so that we can actually get into a full, continuous monitoring across a massive, global network like a large company would have.

Right now, it’s batch. We run our softwares at batch and I want to run it continuously, so we’re in a transition. So, two things, advance sales globally and to get our database up so we can do this continuous monitoring because that’s where the future is. Those are the two things. And so what do I need for that? I need people, and so I need money, so I’m in the fundraising mode right now. That’s my number one job, that’s the key resource I can bring to RedSeal, capital.”

Building A Tougher Wall

ARABIAN COMPUTER NEWS | March 5, 2017

By Ray Rothrock, RedSeal Chief Executive Officer

Ray Rothrock, chairman & CEO of RedSeal, examines the importance of digital resilience in the overall cybersecurity strategy.

Who says prevention is better than cure? Since the advent of networks and hacking, prevention, coupled with detection, has been the primary cyber strategy to counter cyberattacks. But, with the exponential increase in the pace and complexity of digital connections, and sophistication of the attackers, this approach is falling short as the recent Shamoon attacks in Saudi Arabia so clearly demonstrated.

Clearly, we need more and better prevention. But, here’s the cold, hard truth: It’s not a question of if your organisation will suffer a security breach but when – no matter how good your prevention is. Cyber-attacks are now so advanced that, should a hacker’s attention turn to your company, the attack will almost certainly succeed in getting inside your network.  Your mission should be to shut the attacker down – and fast.