RedSeal: Digital Gatekeeper

RED HERRING | November 1, 2016

As our use of technology has evolved, so have the threats that can derail and even destroy a business or even a country. Remember December 2013 when credit card information from 40 million users were stolen a few days before Christmas in a major attack on Target? Or the power outage (allegedly triggered by Russia) which lasted six to nine hours in the Ukraine during Christmas season last year? Cyber attacks are more of a threat to companies and governments today than they were yesterday, and will become even more so tomorrow.

Ray Rothrock: A Venture Capitalist with a Cause

RED HERRING | November 1, 2016

Most venture capitalists embrace the career after a stint as a banker, CEO, or tech executive. Then the average tenure as a VC spans over 15 years, during which they groom two new startups per year, and enjoy the lifestyle attached to that profession. Eventually they retire, often rich, and “vanish to the sunset” as John Fisher, the founder of Draper Fisher elegantly puts it. Few would have anticipated that Ray Rothrock, would have gone the other way, and reversed from a successful quarter century role at Venrock, the famous Rockefeller venture firm, to spearhead a then fledgling start up as his last assignment in his professional journey.

Experts Share Their Cybersecurity Horror Stories

TECHREPUBLIC | October 28, 2016

The hooded hacker hunches over a clacking keyboard, face illuminated by the dim and flickering glow of a monitor. He punches a button and executes the code. He lurks in the dark. He’s a monster with the power to annihilate people, governments, and companies.

Discovering a Cure for Cyber Threats

BECKER’S HOSPITAL REVIEW | October 17, 2016

Improving security for electronic health records will enhance trust and unlock their full potential.

A friend of mine recently had a frustrating experience trying to send his medical records to a major hospital. He wanted to email them, however the hospital said no, they only accept faxed records. They said there are simply too many security risks involved with electronic records.

Data Leaks Evolving into Weapons of Business Destruction

CSO and IT WORLD | October 3, 2016

Most of the recent data breaches involve customer information such as user names and passwords, credit card numbers, and medical histories. The companies hacked are hurt — they have to contact victims, pay for credit monitoring services and fines, and may lose customers, brand reputation, and market value — but that is collateral damage.

Or it has been.

Security Industry Reactions to the Yahoo! Breach

THE CYBER WIRE | September 28. 2016

Last week’s disclosure by Yahoo! that somewhat more than 500 million customers’ credentials had been compromised in a breach dating back to 2014 has prompted widespread reaction from industry experts. The incident has implications for Yahoo!’s consumer trust; it also is seen as likely to affect, adversely, the soft landing the company anticipated in Verizon’s proposed acquisition of Yahoo!’s core assets.

Micro-Segmentation: Good or bad?

COMPUTING | 27 September 2016

Mike Lloyd, CTO at RedSeal, argues that more granular control is a good thing, but it’s easier said than done.

There’s a lot going on in virtual data centres. In security, we’re hearing many variations of the term “micro-segmentation”. (It originated from VMware, but has been adopted by other players, some of them adding spin.)

Yahoo-Verizon Deal May Be Complicated By Historic Hack

CNBC | September 22, 2016

Yahoo faces fallout from lawmakers, users and even Verizon following what could be the biggest data breach in history.

Financial Sector Offers Model for Cybersecurity Sharing

SIGNAL | September 15, 2016

By J. Wayne Lloyd

When it comes to cybersecurity, I have heard many people express consternation and wonderment as to why the government cannot protect the Internet. It boils down to two things: No authorization, and officials only have visibility into a scant number of networks under their control.

To Maintain Democracy, Digital Networks Must Be Improved

ThirdCertainty | September 13, 2016

Automation, segmentation and continuous oversight of voting systems will strengthen trust in government

By Ray Rothrock, RedSeal CEO

As the presidential election enters its home stretch, the Democratic National Convention cyber hack and issues with local voting machines have made cybersecurity part of the election story. After the election, I fully expect an accusation from the loser about electronic voter fraud, which will cast doubt on the most important element in any election: Trust.