In order to provide you with the best experience possible we might sometimes track information about you. Sometimes this may involve writing a cookie. We use this information for things like experience enrichment, analytics and targeting advertising. We recommend allowing these functions to get the most out of your experience.
OKWe may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.
Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.
These cookies are strictly necessary to provide you with services available through our website and to use some of its features.
Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.
We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.
We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.
We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.
Google Webfont Settings:
Google Map Settings:
Google reCaptcha Settings:
Vimeo and Youtube video embeds:
Ray Rothrock: “Assume attackers are in your system”
/by RedSealSC Magazine | January 26, 2016
As cyber attacks increase, IT departments continue to be challenged by older techniques, such as targeted phishing attacks because the attacks bypass perimeter defenses and are difficult to prevent. Ray Rothrock, CEO of RedSeal Networks, spoke with SCMagazine.com on how to mitigate risks.
Security Now: 9 Experts, 5 Bullish Predictions
/by RedSealChannel Partners Online | Jan 13, 2016
“Technology that encourages and promotes intelligence, preparedness and response also will take a radically increased profile in cybersecurity through 2016 and beyond — so organizations will invest more heavily in security solutions that deliver deeper understanding and analysis of their structural, digital and network maps. These types of security technologies will have massive impact on organizations in 2016.” —Ray Rothrock, CEO, RedSeal
Blog: Planning, Training and Automation Are Key to Successful Cyber Hunting
/by RedSealSIGNAL Magazine | Jan 12, 2016
Experts need to write scripts to parse through mountains of data and leverage analytic tools that automate the search. RedSeal’s Chief Technology Officer, Mike Lloyd, likes to say: “We don’t need more mountains of data; we need more data mountaineers.”
Using Technology to Drive Diversity in Your Business
/by RedSealHuffington Post | Jan 12, 2016
Removing bias can start with something as seemingly innocuous as a job post. In one case reported by NPR, cybersecurity firm RedSeal used a program from Unitive to adjust their job descriptions: “Job applications shot up 30 percent, and the percentage of women among the company’s three-dozen engineers has doubled.”
For Enterprise Cyber Security, Think Modern Metropolis, not Fortress
/by RedSealInformation Security Buzz | Jan 1, 2016
Once upon a time, cyber security was like a bank vault. We built thick walls and a big door and we put an armed guard out front. This was more than enough to keep valuable assets secure, because we didn’t have sensitive corporate data and credentials sitting on multiple servers and devices outside a business’s physical headquarters. Read Dr. Mike Lloyd’s byline about the best way to secure an enterprise network.
CEO Ray Rothrock on The Cybersecurity Domino Effect
/by RedSealInfosecurity Magazine | Dec 30, 2015
Almost 400 years ago, the English cleric and poet John Donne penned these immortal words: “No man is an island, entire of itself; every man is a piece of the continent, a part of the main.”
Sublime as that sentiment certainly is, it also describes the cold reality of today’s business environment—our large, dynamic and complex networks are all interconnected, and all interdependent.
This is why we now see numerous high-profile stories about a breach of one company’s network causing serious problems for others in its supply chain. Strap yourselves in: unless we work hard to make things much better, they’re going to get much worse.
RedSeal 2016 Predictions: What 2016 Holds for Cybersecurity
/by RedSealVMBlog | Dec 23, 2015
2015 could have been just another year of data breaches and flawed cyberdefense, but it’s also been a year when cybersecurity conversations have become more prevalent in the boardroom. Business leaders are getting a better understanding of the significance cybersecurity has to the overall wellbeing of their organizations. A lot of work is yet to be done to bridge the cybersecurity awareness gap between IT pros and the C-suite, but after reflecting on what we’ve learned this past year, here are some things we expect to see in 2016:
Our Cybersecurity Problem Is A Lack Of Working Safe Harbor Rules
/by RedSealForbes | Dec 21, 2015
Contributed byline by RedSeal CEO, Ray Rothrock
Women in Business Q&A: Roberta Gray, VP Product Marketing, RedSeal
/by RedSealHuffington Post | Dec 19, 2015
Question & answer with Roberta Gray, VP Product Marketing at RedSeal
2015 Security Predictions
/by RedSealTechZone360 | Dec 17, 2014
2014: The year of the data breach. Although technically the trend started with the massive credit card heist at Target last holiday season, 2014 really saw the perfection of the art, with big hits at Home Depot, Sally Beauty, Michael’s, and yes, the celebrity iCloud photo leak. As bad as it’s been, 2015 will see no slowdown in incidents.
“The subtlety and length of the breaches that are publicly disclosed indicate the underlying goals to be moving away from the ‘smash and grab’ of credit card number thefts towards more systemic damage possible by simply waiting for information and continuing to probe for more content,” said Steve Hultquist.