In order to provide you with the best experience possible we might sometimes track information about you. Sometimes this may involve writing a cookie. We use this information for things like experience enrichment, analytics and targeting advertising. We recommend allowing these functions to get the most out of your experience.
OKWe may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.
Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.
These cookies are strictly necessary to provide you with services available through our website and to use some of its features.
Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.
We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.
We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.
We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.
Google Webfont Settings:
Google Map Settings:
Google reCaptcha Settings:
Vimeo and Youtube video embeds:
Securing the Cloud with Smart SMB
/by RedSealSm@rt SMB | February 2020 (Pages 13-14)
Mike Lloyd, CTO, RedSeal says, “There was a lot of fear at first that cloud would be less secure, but those fears were unfounded. In general, cloud providers do a great job, and they do it full time, 24×7. There have been no recent incidents that can be pinned on a cloud provider failing to do their job.”
He cautions that this does not mean the cloud is perfect safe and there certainly have been cloud breaches that were the fault of the company buying those cloud services.
Cybersecurity Canon Book Review: “Digital Resilience”
/by RedSealPalo Alto Networks Blog | February 27, 2020
I got into cybersecurity because I read books like Winn Schwartau’s “Information Warfare,” William Gibson’s “Neuromancer” and Cliff Stoll’s “Cuckoo’s Egg.” These books gave me a very balanced view of what cybersecurity could be, even though no one called them cyber in the 90s. Until I got Ray Rothrock’s book, “Digital Resilience,” I didn’t have a book I was comfortable with suggesting as a great first read to the next generation of cyber professionals.
If you’ve recently been put in charge of IT or IT operations and didn’t grow up in cyber over the past 20 years, “Digital Resilience” is for you. This book is also equally useful for new CEOs, CFOs or board members who need to understand cyber risk without getting overwhelmed with IT technology or the defeatism of “hackers and nation-states will always get in, so why bother.”
Charting a Path to Hybrid Cloud Security
/by RedSealNutanix Blog | February 20, 2020
The majority of IT pros worldwide consider the most secure IT operating environment to be the hybrid cloud, according to recent research. In a hybrid cloud, some applications and workloads run in private cloud infrastructure, either on-premises or in a third-party hosting environment, while others reside in the public cloud.
…”Competitors that are building clouds all offer different services, with different complex details, and different skills required,” said Dr. Mike Lloyd, RedSeal CTO.
Competing management systems are one issue. Because each vendor innovates and builds its own management layer, effectively maintaining a hybrid environment means that “every IT organization has to become fluent in multiple languages at once,” according to Lloyd.
Huawei warning: Expert reveals how spy could EASILY hack into UK’s 5G network
/by RedSealDaily Express | February 8, 2020
Boris Johnson’s decision to allow Huawei continued access to the UK’s 5G network could lead to a serious threat to the country, a leading expert has warned.The Chinese firm will be allowed to access 35 percent of the UK’s network, which includes its radio networks. Huawei will also be banned from supplying “sensitive” parts to the network, the UK Government revealed last month.
Mr. Johnson declaring there will be limits to Huawei’s access, speaking to Express.co.uk, Dr. Mike Lloyd, security expert and CTO at RedSeal, warned 35 percent is a “huge amount” for any potential spy.
14 Top Data Security Risks Every Business Should Address
/by RedSealForbes | January 30, 2020
6. Managing The Increasingly Complex Digital Business Environment
Data breaches happen because it’s hard to do anything consistently at scale. Our top risk is failing to follow basic rules 100% of the time in a growing, changing, increasingly complex digital business environment. Attackers are like ants in a house—no matter what you do, they always find another way in. We need to manage complexity and apply basic security standards everywhere, all the time. – Mike Lloyd, RedSeal
10 Hot Cybersecurity Companies To Follow In February 2020
/by RedSealCybercrime Magazine | January 20, 2020
Cybersecurity is one of the most urgent world issues, meaning February 2020 is no time for indifference. A new year invariably brings new threats as the news cycle is dominated by high-profile hacks and disastrous cases of negligence.
3. RedSeal
San Jose’s RedSeal saw the light of day in 2004 and has spent the intervening years helping companies improve their cyber risk assessments and their scoring and modeling methodologies.
Performing regular vulnerability assessments is critical in modern cybersecurity and the key to staying ahead of emerging threats. That goes double for health care companies (one of RedSeal’s specialties), who are beholden to HIPAA and various other ongoing threat assessment requirements.
The Latest CISO Headache – IoT
/by RedSealSm@rt SMB | January 2020 (Page 30)
There’s a saying in the security world : “If it’s on the network, it belongs to the CISO.” Dr. Mike Lloyd, RedSeal CTO, discusses some steps the CISO can undertake where traditional techniques don’t seem to have an answer in securing IoT infrastructure.
What’s in Store? Cybersecurity in 2020
/by RedSealTahawulTech | January 2020 (Page 12)
What do you think will be the key drivers for security spending?
We are mid-way through the transition to the cloud, leaving most networks as a complex hybrid. Managing that complexity will be a major spending driver. Another key driver is compliance as the regulatory landscape continues to evolve, new regulations will drive spending. Lastly, cyber insurance will increase in importance in 2020, and this will steer spending towards defences that insurance providers want to see, in much the same way that car insurance drives car safety features. – Mike Lloyd, RedSeal CTO
12 Strategies To Get Your Staff To Stay On Top Of Software Updates
/by RedSealForbes | January 16, 2020
A big irony in security is that the more critical a system is, the less likely it is to be patched well! To keep critical systems available, teams often deprioritize security. While security is abstract, an unavailable system is tangible and immediate. Security teams need to make the risk real so downtime seems necessary. Provide specific, personalized scenarios for why the action matters. – Mike Lloyd, RedSeal
How Defense Contractors Should Prepare for a Cyber Proxy War With Iran
/by RedSealClearanceJobs | January 10, 2020
A plan of action should include some key fundamentals, explained Wayne Lloyd, federal CTO for RedSeal, a cyber terrain modeling company. This can include: Identifying critical data and where it is housed; knowing what assets – physical and virtual – are on your network; hardening your network devices, making sure they are securely configured; reviewing endpoint data sources to make sure you have full coverage of all endpoints on your network; and ensure that your vulnerability scanner is scanning every subnet.