Inside Cybersecurity | May 11, 2021
“The President’s new infrastructure plan must incorporate cybersecurity or the new ports, electrical grids and rail systems it proposes will become a bonanza for hackers looking to exploit supply chains along with critical infrastructure,” said Wayne Lloyd, CTO of Federal at RedSeal.
“We live in a digitized world, and the facilities that would be constructed will add to the complexity of the critical infrastructure networks and further expose unintended access points,” Lloyd said. “These networks are increasingly exceeding the ability of humans to fully account for, making it essential that the White House secures the infrastructure by mandating compliance with existing NIST frameworks for the IT & OT systems and funding for technologies that can help automate and monitor the state of compliance for things such as network segmentation, or we’re going to experience another breach on the scale of SolarWinds.”
IT Pro Portal | April 27, 2021
Let’s analyze security and defense over the ages through a Covid lens.
From ancient Jericho through to medieval Constantinople, people built walls around cities as a main method of defense for around 10,000 years. But we don’t live in walled cities any more – why not? That’s a really big change, and it deserves an explanation.
Our companies aren’t walled cities, but they certainly had a strong tradition of being centralized and walled off. A year ago, we suddenly found that we couldn’t do that any longer. I’ve spoken to many managers who were frankly surprised at how well it has worked to abruptly change the paradigm, and let people work out in the community, away from the supervisor’s beady eye, and outside the protective walls of the building or the network.
MSSP Alert | April 15, 2021
As the Cybersecurity Maturity Model Certification (CMMC) nears full implementation, affected organizations are scurrying to ensure they’ll pass the certification process.
The goal is simple: organizations must meet minimum cybersecurity standards, and in doing so, they do their part to improve national security. The stakes are extraordinarily high for the estimated 300,000 defense industrial base (DIB) organizations which will soon need to be certified to one of the five CMMC levels to be eligible to be awarded a federal contract. Simply stated: no certification, no contract. From the perspective of the U.S. Government and the Department of Defense, the stakes have always been high since the DIB plays such a critical role in the defense of our nation. The only way to ensure the protection of our data and the integrity of the supply chain is to hold industry to a higher standard.
Forbes | April 9, 2021
12. Take a Zero Trust approach.
I hate the phrase “Zero Trust” (and an increasing groundswell of security professionals agree), but the original ideas of the Zero Trust movement do make sense. Old networks were like castles, but today’s networks are like cities—security teams have to think like mayors, not feudal lords. It’s about mapping, coordination and preparation, not about thick stone walls. – Mike Lloyd, RedSeal
Computer Weekly | April 1, 2021
Digital transformation is often associated with disruptive technology, but Mike Lloyd, chief technology officer (CTO) at RedSeal, questions whether the popularity of “disruption” is a positive thing, noting that in most other areas of life it’s a negative term.
“So why is ‘disruption’ seen as cool when it comes to tech?” he asks. “In part, it’s how you get your new idea noticed – the media and investors are always looking for the new-new thing, and see something like a tune-up or improvement of an old thing as boring. Customers see it the other way around – disruption is bad, what most people want to buy is incremental efficiency.”
Authority Magazine | March 23, 2021
An Interview Between Charlie Katz and RedSeal CEO Bryan Barney
What do you think makes your company stand out? Can you share a story?
What makes RedSeal so great is we understand network paths better than anyone in the cybersecurity industry. Modern networks are so complex, no one really understands them. Companies don’t understand what is on their network, how everything is connected, or the security implications. You can’t secure what you don’t understand, and we allow people to understand their network environment. This is particularly important and urgent in the cloud environments that are quickly becoming the heart of all networks.
Cybersecurity Drive | March 22, 2021
The recession caused by the coronavirus pandemic had a chilling effect on economic activity, as companies determined next steps. For some, the solution to weather the contraction was to limit spending, while others accelerated innovation and technology adoption.
The good news is that there is nowhere to go but up. There is likely to be significant pent up demand in the coming year for M&As. In fact, a global survey of 250 senior M&A executives conducted by law firm White & Case LLP found dealmakers are optimistic about the outlook for M&A activity, with three-quarters saying they expect M&A activity to increase in their region in the coming year.
Computer Weekly | March 15, 2021
The operators of critical national infrastructure (CNI) are in an unenviable position, between the devil and the deep blue sea, as two very different worlds collide.
Most critical infrastructure was built up over a century or more of careful, incremental steps by civil engineers, and they focused on the primary threat they faced – lack of availability. If you deliver power, water, or anything else that lives depend on, you focus your attention on making sure the service is never interrupted.
You think through scenarios such as natural disasters, extreme weather, even longer-term risks such as climate change. It’s always you against Murphy’s Law – you assume each element will eventually fail, and so you build in double or triple redundancy.
Silicon Valley Business Journal | March 9, 2021
Hear from members of this year’s C-Suite Award honorees, including RedSeal CTO Dr. Mike Lloyd, talk about how they approached leading their teams and innovating their products during the pandemic.
Global Defence Technology | March 1 2021
As military and civilian capabilities increasing rely on space-based assets, Berenice Healey asks space and cybersecurity experts about the potential effects of a cyberattack against them and how to offer protection….
“As the network increases in scale, it gets further and further beyond human comprehension – too many interacting parts, any one of which could be breached by an attacker and used as a foothold for further spread.”