In order to provide you with the best experience possible we might sometimes track information about you. Sometimes this may involve writing a cookie. We use this information for things like experience enrichment, analytics and targeting advertising. We recommend allowing these functions to get the most out of your experience.
OKWe may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.
Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.
These cookies are strictly necessary to provide you with services available through our website and to use some of its features.
Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.
We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.
We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.
We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.
Google Webfont Settings:
Google Map Settings:
Google reCaptcha Settings:
Vimeo and Youtube video embeds:
Experts weigh in on Anthem breach, speculate on how attackers broke in
/by RedSealSC Magazine | Feb 5, 2015
Part of the problem Anthem might have been facing is that “large organizations cannot visualize and understand their whole attack surface, and inevitably end up leaving some side door unlocked and overlooked,” Mike Lloyd, CTO of RedSeal, told SCMagazine.com in a Thursday email correspondence.
What the Centcom Twitter Hack Means to You
/by RedSealGovernment Technology Magazine | Jan 23, 2015
Robert Capps, senior director of customer success at security analytics company RedSeal, said that attacks on social media accounts don’t generally indicate a significant security issue within the attacked organization.
New framework helps companies quantify risk
/by RedSealCSO Magazine | Jan 23, 2015
The World Economic Forum has released a new framework this week that helps companies calculate the risk of cyberattacks. In the framework, created with collaboration of Deloitte, the World Economic Forum admits that there are some challenges involved. For example, there’s a lack of the historical data necessary to estimate the probability of attacks from particular types of attackers for particular industry segments. The lack of good data is also holding back the evolution of a strong cyber insurance market, said Mike Lloyd, CTO at Sunnyvale, Cal.-based RedSeal, Inc.
CEOs Talk 2014 Successes
/by RedSealNBC Chicago | Jan 16, 2015
NBC Chicago talks with Ray Rothrock about RedSeal successes in 2014.
CEOs Give Predictions for 2015
/by RedSealNBC Chicago | Jan 16, 2015
NBC Chicago taps Ray Rothrock to get his 2015 predictions.
US Centcom Twitter hack: ‘More of an embarrassment than a security risk’, says analyst
/by RedSealThe Telegraph | Jan 13, 2015
US Central Command’s Twitter and YouTube sites was hacked by Islamic State on Monday. Robert Capps, Senior Director at RedSeal Networks, said hacking a social media site is nothing like attacking a network. “If that happened, then we’ve got a much more difficult problem that we have to deal with,” said Capps.
White House lays out ideas for information sharing
/by RedSealFederal Computer Week | Jan 13, 2015
President Barack Obama sought to spur Congress to action on cybersecurity information-sharing legislation by announcing his own proposal on Jan. 13. Information security specialists welcomed the president’s proposal but said it was only one step toward improving situational awareness in the private sector. “If organizations hope to benefit from timely intelligence information, they will need to understand their own defensive posture and readiness,” said Mike Lloyd, chief technology officer at analytics firm RedSeal, in a statement.
Ray Rothrock, CEO of Redseal, talks about how companies’ increasingly complex networks enable opportunities for cyber attacks – and what to do about it.
/by RedSealNBC | Jan 12, 2015
Google under fire over Windows zero-day disclosure
/by RedSealComputerWeekly | Jan 6, 2015
Google has come under fire for publishing a proof-of-concept attack exploiting a flaw in Windows 8.1 before Microsoft had released a security update. “Ethics aside, the Windows 8.1 flaw underlines that in modern enterprise network-connected systems, local exploits have enterprise-wide implications,” said chief evangelist at security analytics firm RedSeal, Steve Hultquist.
Long-Running Cyberattacks Become The Norm
/by RedSealInformationWeek’s Dark Reading | Jan 2, 2015
One thing that the depressing string of data breaches this year shows is that cyber attackers have become skilled at staging long-lasting data exfiltration campaigns. “We are beginning to realize in some cases that the situation is far worse than we realized,” says Stephen Hultquist, chief evangelist at RedSeal Networks. “In some cases attackers have been inside networks for months and even years without being discovered,” he says, pointing to the recently disclosed Regin APT threat as an extreme example.