TAG Cyber | October 4, 2019
During a recent call, RedSeal’s Chief Product Officer, Kurt Van Etten, referenced an enterprise challenge that is too familiar. He shared with Ed Amoroso and me that maintaining and understanding one’s network asset inventory, both hardware and software, is the key to maintaining a strong cyber security program. It’s not sexy, and not what gets the most attention in media or at conferences, but companies must know what they have, where it is, and who has access.
HPC Wire | October 3, 2019
All the panelists commented on workforce issues. There was general agreement that AI is developed most effectively in multi-discipline environments.
“The cyber industry is about a $126 billion [market]. There are 3,000 products out there. A typical large corporation probably like Exelon has 50 or 60 cyber products and only five or 10 people to operate it. Well, that number, it’s a crushing situation. And while you need engineers, for sure, you also need technicians. They don’t need all need a four-year degree, they need a piece of it,” said Rothrock.
New York Times | September 29, 2019
Ben Cohen, the co-founder of Ben & Jerry’s Ice Cream, calls spending huge amounts on the effort “a tragic waste.” Another urges creation of a cabinet-level agency to deal with threats.
To the Editor:
Glenn S. Gerstell’s article identifies the magnitude of the digital juggernaut and brilliantly lays out the difficulty of the challenge. It is this very complexity that underscores the need for a cabinet-level agency dedicated to cybersecurity to ensure coordination and resilience in the face of threats.
The Department of Homeland Security was created after the 9/11 tragedy, coordinating 180,000 employees working in the country’s intelligence, defense and law enforcement agencies. Similarly, in the 1970s, as Americans dealt with an energy crisis, President Jimmy Carter created the Energy Department to consolidate American energy policy and ensure a consistent supply of energy and protect the country from threats to our economy and readiness.
If desperate times call for desperate measures, then surely risky and rapidly changing times call for measures that are resolute. The United States must prioritize cybersecurity, just as we do homeland security and energy. Let’s not wait until the revolution is lost.
San Jose, Calif.
The writer is chief executive of RedSeal, a cybersecurity company, and the author of “Digital Resilience: Is Your Company Ready for the Next Cyber Threat?”
Security Boulevard | September 26, 2019
Mergers and acquisitions can be successful growth strategies for many companies. They bring together customers, IP, and assets — but they also bring together liabilities and risk as well. Among these are cybersecurity risks. “Cyber diligence” — cybersecurity evaluations performed as part of the M&A decision-making processes — has grown in importance in recent years. What are a company’s vulnerabilities? What cybersecurity issues or incidents have they had in the past, and how have they dealt with them? What defenses do they have in place to protect themselves? Are all important questions to ask in an M&A deal. But even if you’re not involved with a merger or acquisition, the same analysis can yield important and surprising results.
DataCenter Knowledge | September 25, 2019
Last week, Oracle co-founder and CTO Larry Ellison claimed that Oracle’s new autonomous systems will eliminate all data breaches. Not everyone’s buying it….
Mike Lloyd, CTO of cybersecurity vendor RedSeal, called Oracle’s latest promises an example of “hyperbolic marketing.”
“People find clouds inherently confusing, not least when trying to understand who is responsible for what,” he said. “Of course, if you think your cloud vendor is responsible for some aspect of security, but they think you’re responsible for it, then you’re on a road to a bad place.”
SC Magazine | September 23, 2019
Why Nominated: Having spent decades leading and advising both technology and information security companies, Rothrock knows that cybersecurity for any organization goes well beyond just deploying and managing strong technologies. It’s also about strategically thinking about security needs holistically top down. And, for him, this means that since every entity is a “cyber organization,” the related risks they face are a CEO and board-level responsibility. With this foundation in mind, Rothrock works well beyond the confines of his office, reaching out practitioners, C-level executives, government leaders and even average citizens through a bevy of activities and ventures.
Kotecki On Tech | September 16, 2019
RedSeal CEO Ray Rothrock joins Kotecki On Tech – an interview show about the future. Technology executives, visionaries, and policymakers join host James Kotecki to explore where we are today and where we’re going tomorrow.
“How do you recover from an attack and not go down?”
His answer: apply a resilience mindset from the physical world to deal with digital danger.
The Mercury News | September 15, 2019
Following the 2016 elections, investigators found evidence that Russian hackers successfully infiltrated the computerized voting systems of several states. Hackers also stole data from campaigns and weaponized social media polarizing the electorate against and for certain candidates. All of this undermines the trust we all place in the United States’ election system. There is nothing more powerful in a democratic country than a legitimate election. Unchecked, these actions and future similar future actions against our elections are a significant danger to our democracy. It’s clear we’ll be facing similar threats in the 2020 election cycle.
Intelligent CISO | Issue 17 / Page 50
Ensuring the data centre is secure should be a top priority for CISOs as the consequences of a breach could be catastrophic. Industry experts from Vectra and RedSeal outline some of the biggest cyber-risks to data centres and offer their advice on how to ensure this critical infrastructure is protected.
“When thinking about risks to data centres, I’m reminded of an old bank robber story – when asked why he robbed banks, he replied ‘because that’s where the money is’. It’s always good to think like an attacker,” said Dr. Mike Lloyd, RedSeal CTO.
Blog InfoSec | August 26, 2019
Ray Rothrock of Redseal suggests that increasingly sophisticated attacks require fast response and victim organizations should not cover them up. He said that prevention requires security guidelines and education. He also advises making Boards of Directors accountable, as with Sarbanes-Oxley, but dilutes his suggestion because he believes that fewer individuals will take on the responsibility.