In order to provide you with the best experience possible we might sometimes track information about you. Sometimes this may involve writing a cookie. We use this information for things like experience enrichment, analytics and targeting advertising. We recommend allowing these functions to get the most out of your experience.
OKWe may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.
Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.
These cookies are strictly necessary to provide you with services available through our website and to use some of its features.
Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.
We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.
We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.
We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.
Google Webfont Settings:
Google Map Settings:
Google reCaptcha Settings:
Vimeo and Youtube video embeds:
Why 334M People Should Care About Friday, July 1
/by RedSealINFORMATION SECURITY BUZZ | July 1, 2016
Utility companies nationwide are angst-ing about Friday. Not because it’s a long weekend, but because July 1 marks the end of the extended deadline for compliance – imposed by the Federal Energy Regulation Commission (FERC) – with NERC’s(N. American Electric Reliability Corp.) Critical Infrastructure Protection (CIP) V5 standards.
Why is this important?
Cyber Resilience Protects Medical Data
/by RedSealBUSINESS INSURANCE | June 19, 2016
Health care organizations are becoming resilient in the face of cyber attacks as hackers attempt to access sensitive patient information.
Experts from Zurich North America and RedSeal Inc., a Sunnyvale, California-based cyber security firm, discussed how health care providers, insurers and affiliated companies can bounce back when data breaches are discovered.
The Chinese Hackers in the Back Office
/by RedSealNEW YORK TIMES | June 11, 2016
BELLEVILLE, Wis. — Drive past the dairy farms, cornfields and horse pastures here and you will eventually arrive at Cate Machine & Welding, a small-town business run by Gene and Lori Cate and their sons. For 46 years, the Cates have welded many things — fertilizer tanks, jet-fighter parts, cheese molds, even a farmer’s broken glasses.
And like many small businesses, they have a dusty old computer humming away in the back office. On this one, however, an unusual spy-versus-spy battle is playing out: The machine has been taken over by Chinese hackers.
The hackers use it to plan and stage attacks. But unbeknown to them, a Silicon Valley start-up is tracking them here, in real time, watching their every move and, in some cases, blocking their efforts.
Has Ransomware Become the Chicken Little of the Security Industry?
/by RedSealSC MAGAZINE UK | June 16, 2016
That ransomware is a problem cannot be doubted. Whether the current level of media coverage, fuelled by vendor press releases, is doing more harm than good is more open to debate..
Just today SCMagazineUK.com reported how Avecto research had revealed that 30 percent of UK councils suffered at least one ransomware attack in 2015. That is big news.That Smart TVs have been infected by the Flocker ransomware maybe less so. Unless it’s your TV that is asking for cash to start working properly again of course.
Silicon Valley Has a Chance to Influence Cyber Security Policy
/by RedSealUSA TODAY | June 16, 2016
U.S. cybersecurity policy has followed a Jekyll-and-Hyde path lately.
In December, Congress passed a bill making it easier for U.S. software companies to hold onto their proprietary technology, to encourage them to share data on cyber threats. It was part of a new push for open cybersecurity standards to help combat rapidly-evolving threats.
In April, however, the Senate Intelligence Committee introduced a bill that would force U.S. companies to provide backdoor access to encrypted data to law enforcement in response to a warrant.
Potential Ramifications of the DNC Hack
/by RedSealPOLITICO | June 15, 2016
AFTER THE DNC ATTACK — The blockbuster news that Russians reportedly hacked the Democratic National Committee to get opposition research on Donald Trump and other information inflamed GOP criticism of Hillary Clinton’s private email server. But it had a host of security ramifications, not just political ones. MC spoke to, or heard from, a range of experts on the meaning of it all.
Make Cybersecurity an Essential Part of M&A Due Diligence
/by RedSealINSTITUTIONAL INVESTOR | June 2, 2016
2015 was certainly a bumper year for M&As. It’s a sure bet that before any of the 2015 M&A deals went through, the buyers looked very carefully at their “target” companies. They will have gone through a comprehensive appraisal and due diligence process that lasted from a few months to a year.
Buyers and their agents (auditors, lawyers and bankers) will have had a pretty exhaustive evaluation checklist – review software licenses, audit financials, inspect buildings, count inventory, validate the value of intangible assets, look at intellectual property, and — the step that’s caused about half of my companies some heartburn — determine if all the shareholders can be contacted and notified. As an investor, I have pretty extensive experience in this process, having been involved in some 34 acquisitions; and one all too common oversight that I am resolute in ensuring makes it to the checklist is cyber security.
How Do We Win the Cyberwar?
/by Ray Rothrock, Executive Chairman, RedSealHARVARD BUSINESS SCHOOL ALUMNI | June 1, 2016
We’re losing the war against hackers, and it’s costing business billions. Alumni cybersecurity experts tell us how we can turn the tide
Your credit card has already been stolen. You just don’t know it yet.
Thomas knows it, though. (A 12-year IT security veteran, Thomas requested anonymity to protect the reputation of his employers, which have included Fortune 100 companies and several of New England’s biggest tech firms.) In the analogy of cyberdefense as a castle—a favorite of his—he tends to the moats, the walls, and the gates. Get past those, and he deploys the dogs. And he’s watched many people scale walls, break gates, evade dogs, and leave with your AmEx number.
RedSeal’s Rothrock: Cybersecurity must evolve, focus on resiliency to combat future threats
/by RedSealGOVERNMENT SECURITY NEWS | May 13, 2016
An ounce of prevention is worth a pound of cure. That’s a saying attributed to Ben Franklin.
But it’s a strategy that’s not working for cybersecurity, according to the CEO of a leading IT analytics company.
6 Steps to Increase Cybersecurity in the Age of Innocence
/by RedSealSIGNAL | May 10, 2016
Let’s face it—we have a lot to learn about cybersecurity. For weeks, the FBI and Apple squared off in an epic and public battle over encryption—the Holy Grail for cybersecurity warriors.