Dr. Mike Lloyd, CTO at RedSeal, on “the next big thing in security”
We are in unprecedented times and no one can truly predict what lies ahead. What do we know is that threat actors are on the lookout for vulnerabilities and the sudden move to remote operations may have left loopholes that they can leverage. We sat down with security experts to understand how the security landscape may shape up next year.
https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png00Keith Dohttps://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.pngKeith Do2020-12-14 19:06:022020-12-14 19:06:39Network Middle East: The Next Big Thing in Security
It’s not news that the pace of change in IT is extremely fast. What’s less well-known is the downside — tool sprawl. IT teams innovate at a breakneck pace, picking up whatever innovations suit their immediate needs. Security, in contrast, must protect the old applications that are still around, plus the new ones, plus the different platforms those new applications are built on. It creates a juggling challenge – how many different technologies can your security team juggle at once? If you have too many, how do you decide which are most important and which you must drop?
Security operations, or SecOps, has had a direct, if increasingly challenging, mandate since the dawn of enterprise networking: detect, respond to, predict and prevent cyberattacks. But SecOps roles and responsibilities are shifting to accommodate growing interest in an offensive, rather than defensive, approach to cybersecurity. By staying ahead of threats and anticipating bad actors’ next moves, security leaders aim to thwart attacks before they happen.
https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png00Erica Venerhttps://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.pngErica Vener2020-12-07 08:54:272020-12-09 09:03:147 SecOps roles and responsibilities for the modern enterprise
Bottom Line: In 2021, cybersecurity vendors will accelerate AI and machine learning app development to combine human and machine insights so they can out-innovate attackers intent on escalating an AI-based arms race.
https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png00Erica Venerhttps://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.pngErica Vener2020-12-05 09:04:472020-12-09 09:08:32Top 20 Predictions Of How AI Is Going To Improve Cybersecurity In 2021
The UK’s tech skills gap is set to decrease as over half of workers are contemplating a career change into more tech-based roles, new research suggests.
A survey of over 2,000 professionals from CWJobs found that over half (55%) of non-tech workers are contemplating a career change.
https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png00Erica Venerhttps://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.pngErica Vener2020-11-05 13:45:392020-11-05 13:46:29UK tech skills gap to reduce as more Brits consider IT jobs
As the Cybersecurity Maturity Model Certification (CMMC) nears full implementation, affected organizations are scurrying to ensure they’ll pass the certification process.
The goal is simple: organizations must meet minimum cybersecurity standards, and in doing so, they do their part to improve national security. The stakes are extraordinarily high for the estimated 300,000 defense industrial base (DIB) organizations which will soon need to be certified to one of the five CMMC levels to be eligible to be awarded a federal contract. Simply stated: no certification, no contract. From the perspective of the U.S. Government and the Department of Defense, the stakes have always been high since the DIB plays such a critical role in the defense of our nation. The only way to ensure the protection of our data and the integrity of the supply chain is to hold industry to a higher standard.
https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png00Wayne Lloyd, Federal CTO, RedSealhttps://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.pngWayne Lloyd, Federal CTO, RedSeal2020-10-12 09:14:222020-10-12 09:14:22What You Need to Know About CMMC Certification
Federal teleworkers need to know the cyber basics.
When it comes to nefarious deeds, the COVID-19 pandemic has been a gold mine for bad actors. In addition to wreaking havoc for individuals and healthcare organizations, federal agencies are also prime targets. Case in point: a portion of the Department of Health and Human Services’ (HHS) website was recently compromised, in what appears to be a part of an online COVID-19 disinformation campaign.
In a time of heightened cyber risk and limited human and fiscal resources, how can agencies protect their networks from malicious actors by taking a page from the COVID playbook? They can diligently practice good (cyber) hygiene.
https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png00Erica Venerhttps://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.pngErica Vener2020-10-08 10:26:282020-10-08 10:26:28The Role of Cyber Hygiene in the COVID Crisis
A look at security, both on-premise and in the cloud.
By Dr. Mike Lloyd
In a world as nebulous as cloud computing and DevOps, analogies can sometimes help us to think more clearly. The idea of “pets versus cattle” was first used nearly a decade ago to help delineate the difference between traditional on-premises IT and the cloud, and has become a firm favorite in the DevOps community ever since. But there are also lessons here for cybersecurity teams, as long as they’re able to see through the limits of the analogy and understand where the main challenges are.
https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png00Erica Venerhttps://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.pngErica Vener2020-09-29 09:13:452020-09-29 09:13:45Pets vs cattle: How to get cloud and DevOps security right
As a part of our series about strong women leaders, I had the pleasure of interviewing Julie Parrish.
Thank you so much for doing this with us! Before we dig in, our readers would like to get to know you a bit more. Can you tell us a bit about your “backstory”? What led you to this particular career path?
I was opportunistic more so than strategic in managing my career path. My Bay Area university education and slightly technical degree led to opportunities based in the Silicon Valley, and in high-tech. I chose Hewlett Packard for my first job because it was a big stable company, well-known and well respected. At that point in my life, I did not have a clear sense of how I wanted my career to play out, but I knew that starting at HP would be a great platform for learning and growing.
https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png00Erica Venerhttps://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.pngErica Vener2020-09-11 15:15:122020-09-15 16:02:55Julie Parrish of RedSeal: “There is an awful lot that will happen outside of your control; how you react is crucial”
Deepfakes, until recently, have just been an amusing part of the internet. Videos emerged of various celebrities in the wrong movie or interview, some were quite poorly made but others were almost like the real thing. They were entertaining and funny; not really given much thought and left to a corner of the internet. However, it was not long before politicians were the next target, videos emerging of significant figures like Barack Obama, Nancy Pelosi and Donald Trump.
It was at this point that some serious concerns started to develop over the security implications of this technology.
https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png00Erica Venerhttps://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.pngErica Vener2020-09-02 16:43:212020-09-02 16:43:21Deepfakes and deep fraud: The new security challenge of misinformation and impersonation
Responding to the SolarWinds Orion Compromise -Read Now
Network Middle East: The Next Big Thing in Security
/in In the News /by Keith DoNetwork Middle East | December 2020 (Page 29)
Dr. Mike Lloyd, CTO at RedSeal, on “the next big thing in security”
We are in unprecedented times and no one can truly predict what lies ahead. What do we know is that threat actors are on the lookout for vulnerabilities and the sudden move to remote operations may have left loopholes that they can leverage. We sat down with security experts to understand how the security landscape may shape up next year.
Tool Sprawl – The Cybersecurity Challenge of 2021
/in In the News /by Erica VenerSolutions Review | December 14, 2020
It’s not news that the pace of change in IT is extremely fast. What’s less well-known is the downside — tool sprawl. IT teams innovate at a breakneck pace, picking up whatever innovations suit their immediate needs. Security, in contrast, must protect the old applications that are still around, plus the new ones, plus the different platforms those new applications are built on. It creates a juggling challenge – how many different technologies can your security team juggle at once? If you have too many, how do you decide which are most important and which you must drop?
7 SecOps roles and responsibilities for the modern enterprise
/in In the News /by Erica VenerSearchSecurity | December 7, 2020
Security operations, or SecOps, has had a direct, if increasingly challenging, mandate since the dawn of enterprise networking: detect, respond to, predict and prevent cyberattacks. But SecOps roles and responsibilities are shifting to accommodate growing interest in an offensive, rather than defensive, approach to cybersecurity. By staying ahead of threats and anticipating bad actors’ next moves, security leaders aim to thwart attacks before they happen.
Top 20 Predictions Of How AI Is Going To Improve Cybersecurity In 2021
/in In the News /by Erica VenerForbes | December 5, 2020
Bottom Line: In 2021, cybersecurity vendors will accelerate AI and machine learning app development to combine human and machine insights so they can out-innovate attackers intent on escalating an AI-based arms race.
UK tech skills gap to reduce as more Brits consider IT jobs
/in In the News /by Erica VenerIT Pro | 4 November 2020
The UK’s tech skills gap is set to decrease as over half of workers are contemplating a career change into more tech-based roles, new research suggests.
A survey of over 2,000 professionals from CWJobs found that over half (55%) of non-tech workers are contemplating a career change.
What You Need to Know About CMMC Certification
/in In the News /by Wayne Lloyd, Federal CTO, RedSealSupply Chain Brain | October 7, 2020
As the Cybersecurity Maturity Model Certification (CMMC) nears full implementation, affected organizations are scurrying to ensure they’ll pass the certification process.
The goal is simple: organizations must meet minimum cybersecurity standards, and in doing so, they do their part to improve national security. The stakes are extraordinarily high for the estimated 300,000 defense industrial base (DIB) organizations which will soon need to be certified to one of the five CMMC levels to be eligible to be awarded a federal contract. Simply stated: no certification, no contract. From the perspective of the U.S. Government and the Department of Defense, the stakes have always been high since the DIB plays such a critical role in the defense of our nation. The only way to ensure the protection of our data and the integrity of the supply chain is to hold industry to a higher standard.
The Role of Cyber Hygiene in the COVID Crisis
/in In the News /by Erica VenerSignal Magazine | October 7, 2020
When it comes to nefarious deeds, the COVID-19 pandemic has been a gold mine for bad actors. In addition to wreaking havoc for individuals and healthcare organizations, federal agencies are also prime targets. Case in point: a portion of the Department of Health and Human Services’ (HHS) website was recently compromised, in what appears to be a part of an online COVID-19 disinformation campaign.
In a time of heightened cyber risk and limited human and fiscal resources, how can agencies protect their networks from malicious actors by taking a page from the COVID playbook? They can diligently practice good (cyber) hygiene.
Pets vs cattle: How to get cloud and DevOps security right
/in In the News /by Erica VenerITProPortal | September 25, 2020
A look at security, both on-premise and in the cloud.
By Dr. Mike Lloyd
In a world as nebulous as cloud computing and DevOps, analogies can sometimes help us to think more clearly. The idea of “pets versus cattle” was first used nearly a decade ago to help delineate the difference between traditional on-premises IT and the cloud, and has become a firm favorite in the DevOps community ever since. But there are also lessons here for cybersecurity teams, as long as they’re able to see through the limits of the analogy and understand where the main challenges are.
Julie Parrish of RedSeal: “There is an awful lot that will happen outside of your control; how you react is crucial”
/in In the News /by Erica VenerAuthority Magazine | September 10, 2020
As a part of our series about strong women leaders, I had the pleasure of interviewing Julie Parrish.
Thank you so much for doing this with us! Before we dig in, our readers would like to get to know you a bit more. Can you tell us a bit about your “backstory”? What led you to this particular career path?
I was opportunistic more so than strategic in managing my career path. My Bay Area university education and slightly technical degree led to opportunities based in the Silicon Valley, and in high-tech. I chose Hewlett Packard for my first job because it was a big stable company, well-known and well respected. At that point in my life, I did not have a clear sense of how I wanted my career to play out, but I knew that starting at HP would be a great platform for learning and growing.
Deepfakes and deep fraud: The new security challenge of misinformation and impersonation
/in In the News /by Erica VenerIDG Connect | September 1, 2020
Deepfakes, until recently, have just been an amusing part of the internet. Videos emerged of various celebrities in the wrong movie or interview, some were quite poorly made but others were almost like the real thing. They were entertaining and funny; not really given much thought and left to a corner of the internet. However, it was not long before politicians were the next target, videos emerging of significant figures like Barack Obama, Nancy Pelosi and Donald Trump.
It was at this point that some serious concerns started to develop over the security implications of this technology.