Thought Leaders in Cybersecurity | Blog | RedSeal
RedSeal
  • Platform
    • RedSeal Platform
    • Solutions
      • Network Visualization
      • Compliance
      • Risk Prioritization
    • CTEM
    • Integrations
  • Services
    • CTEM
    • Professional Services
    • Customer Support
    • RedSeal University
    • Remote Workforce
  • Industries
  • Partners
    • RedSeal Partners
    • Partner Portal
  • Company
    • About RedSeal
    • Leadership
    • Careers
  • Resources
    • Blog
    • Events
    • Resource Center
  • Contact Us
  • GET A DEMO
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

BLOG

What Is Cloud-Native Application Protection Platform (CNAPP), An Extension of CSPM

2023-05-02/by Venkat Ayyer, Technical Marketing Director

Modern businesses are increasingly storing data in the cloud and for a good reason — to increase agility and cut costs. But as more data and applications migrate to the cloud, the risk of data and systems being exposed increases. Conventional methods for addressing security aren’t equipped to manage containers and server-less environments. Therefore, gaps, silos, and overall security complexity increase.

This is where Cloud-Native Application Protection Platform (CNAPP), an extension of Cloud Security Posture Management (CSPM), excels. This new cloud platform combines the features of CSPM, Cloud Infrastructure Entitlement Management (CIEM), Cloud Workload Protection Platforms (CWPPs), CI/CD security, and other capabilities into a unified, end-to-end encrypted solution to secure cloud-native applications across the full application lifecycle.

Read more
https://www.redseal.net/wp-content/uploads/2023/05/CNAPP-CSPM.png 627 1200 Venkat Ayyer, Technical Marketing Director https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png Venkat Ayyer, Technical Marketing Director2023-05-02 19:47:252023-05-02 19:57:00What Is Cloud-Native Application Protection Platform (CNAPP), An Extension of CSPM

The Hidden Attack Surface: What’s Missing in Your Cloud Security Strategy?

2023-04-18/by Venkat Ayyer, Technical Marketing Director

It happens all the time. A company has the right security policies in place but misconfigures the environment. They think they are protected. Everything looks fine. They locked the doors and boarded up the windows to the room where the crown jewels are kept, but nobody noticed that the safe that holds the jewels is no longer in that room. Accidentally, it was moved to another location, which is left wide open.

Here’s another common scenario. When working in the cloud, someone in your company can easily turn on a policy that allows anyone to gain access to your critical resources. Or, maybe you grant temporary access to a vendor for maintenance or troubleshooting but then forget to revoke the access. There may be legitimate reasons to grant access, but if that resource is compromised, your cloud can be infected.

Read more
https://www.redseal.net/wp-content/uploads/2023/04/the-hidden-attack-surface.png 627 1200 Venkat Ayyer, Technical Marketing Director https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png Venkat Ayyer, Technical Marketing Director2023-04-18 11:53:052023-04-28 09:29:31The Hidden Attack Surface: What’s Missing in Your Cloud Security Strategy?

Tales from the Trenches: Vol 10 — You Don’t Know What You Don’t Know

2023-04-04/by Michael Wilson, Senior Network Security Engineer

In my customer’s environment, the network is segmented and managed by both the customer and several contracted partners. It is a difficult task to have visibility into an entire network that is distributed across several different contracted partners, let alone keep track of all of the devices and changes that can occur across a network. The adage of ‘you don’t know what you don’t know’ is very relevant in a situation like this. RedSeal has the ability to provide my customer with a single pane of glass to see all these network segments that are managed by different contracted partners.

Read more
https://www.redseal.net/wp-content/uploads/2023/04/vol-10-tales-from-the-trenches.png 627 1200 Michael Wilson, Senior Network Security Engineer https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png Michael Wilson, Senior Network Security Engineer2023-04-04 13:41:442023-04-04 13:45:31Tales from the Trenches: Vol 10 — You Don’t Know What You Don’t Know

Top Reasons State and Local Governments Are Targeted in Cyberattacks

2023-03-28/by Anthony Grasso, Sales Director, CA

Ransomware attacks affected at least 948 U.S. government entities in 2019 and cost local and state governments over $18 billion in 2020. These agencies are prime targets for cyberattacks. Their dispersed nature, the complexity of their networks, the vast amounts of valuable personal data they process and store, and their limited budget prevent them from staying current with the latest best practices.

Strengthening your defense starts with understanding the top reasons why threat actors choose to target state and local governments. Then, implement the latest technologies and best practices to protect your organization from attacks.

Read more
https://www.redseal.net/wp-content/uploads/2023/03/top-reasons-state-local-targeted-cyber.png 627 1200 Anthony Grasso, Sales Director, CA https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png Anthony Grasso, Sales Director, CA2023-03-28 11:26:322023-03-28 11:29:39Top Reasons State and Local Governments Are Targeted in Cyberattacks

Tales from the Trenches: Vol 9 — The Law of Unintended Consequences, OR Some Doors Swing Both Ways

2023-03-21/by Bill Burge, RedSeal Professional Services

“The law of unintended consequences” states that the more complex the system, the greater the chance that there is no such thing as a small change.

While working with a customer in the early days of my RedSeal Professional Services tenure, I looked for an opportunity to prove the capability of Zones & Policies. In an unfamiliar environment, the easy starting point is creating a policy that examines the access from “Internet to all internal subnets.” It is easy to setup and easy to discuss the results, UNLESS the results say that most of the Internet can get to most of the internal network.

Read more
https://www.redseal.net/wp-content/uploads/2023/03/vol-9-tales-from-the-trenches.png 627 1200 Bill Burge, RedSeal Professional Services https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png Bill Burge, RedSeal Professional Services2023-03-21 23:51:522023-03-21 23:54:20Tales from the Trenches: Vol 9 — The Law of Unintended Consequences, OR Some Doors Swing Both Ways

Top 4 Cyber Challenges for Credit Unions

2023-03-14/by Venkat Ayyer, Technical Marketing Director

Credit unions continue to be the primary targets of cyberattacks like phishing, ransomware, and supply chain attacks. This is due to the highly confidential nature of the data they collect and store. If this data falls into the wrong hands, the outcome can negatively impact the institution’s reputation, as well as its legal and financial standing.

Cyberattacks aimed at credit unions come at a high cost. Financial loss can range from $190,000 for small credit unions to as high as $1.2 million for large credit unions.

As technology advances, so have the cyber threats targeting credit unions. The National Credit Union Administration (NCUA) has continuously encouraged credit unions to “strengthen their institution’s cyber vigilance and preparedness efforts” to protect themselves and their members.

Read more
https://www.redseal.net/wp-content/uploads/2023/01/redseal-logo-1385x620-1.png 620 1385 Venkat Ayyer, Technical Marketing Director https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png Venkat Ayyer, Technical Marketing Director2023-03-14 09:40:452023-03-14 09:40:45Top 4 Cyber Challenges for Credit Unions

National Cyber Strategy — What We Know So Far

2023-03-07/by Dr. Mike Lloyd, CTO, RedSeal

I’ve run into several folks who wanted to ignore the Biden Administration’s recently announced National Cybersecurity Strategy – “isn’t that just for Federal agencies?”. That would be a dangerously flawed assumption! This is a major shift in strategy, and regardless of how small your organization is, it’s going to change how you get to a secure state, and how you show that you’re doing it.

The administration makes no secret of its goals, even if they are controversial. They openly describe a target of shifting the playing field, and as always, this creates winners and losers. You need to be agile to ensure you’re on the winner side of this equation! The tilted playing field is aiming for two effects. One goal is to change the economic risk/reward so that bad actors think twice. The other is a significant shift in the burden of defense, pushing it up from smaller mom-and-pop scale organizations, transferring it to larger, more capable companies.

Read more
https://www.redseal.net/wp-content/uploads/2023/03/national-cyber-strategy-what-we-know-so-far.png 627 1200 Dr. Mike Lloyd, CTO, RedSeal https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png Dr. Mike Lloyd, CTO, RedSeal2023-03-07 10:34:012023-03-07 10:34:01National Cyber Strategy — What We Know So Far

Tales from the Trenches: Vol 8 — Is that what you are going to say to the Auditor?

2023-02-28/by Brad Schwab, Senior Security Solutions Consultant

One of the biggest elephant in the room questions for Security Operations groups that deal with Vulnerability Scanners is very simple to state, but very, very tricky to answer, “are you sure you are scanning the entire network?” Sounds like it should be a simple yes or no answer. However, with any network of scale, the answer can be almost impossible to verify.

I was in a high level meeting for a large Health Organization with the CTO, head of Network Operations (NetOps), the head of Security Operations (SecOps), along with other people that had different stakes in the performance and security of the network. Since the network was the main instrument supporting the “Money Engine” of the operation, all attendees were laser focused on answers to any questions.

Read more
https://www.redseal.net/wp-content/uploads/2023/02/vol-8-tales-from-the-trenches.png 627 1200 Brad Schwab, Senior Security Solutions Consultant https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png Brad Schwab, Senior Security Solutions Consultant2023-02-28 12:10:032023-02-28 12:17:46Tales from the Trenches: Vol 8 — Is that what you are going to say to the Auditor?

Why Visualizing the Entire Healthcare Attack Surface Is Critical

2023-02-16/by Bob Schultz, Sales Director, Mid-Atlantic

In recent years, the healthcare sector has been steadily adopting web and cloud-based technologies and shifting towards an internet-enabled system to improve quality of care. 

However, along with the limitless benefits that the internet offers — like sharing information, simplifying operational processes, tracking workflows, enhancing connectivity, and storing and organizing data — is an increased risk of cyberattacks, data breaches, and other types of fraud. This makes hospitals and healthcare organizations increasingly vulnerable to advanced threats and targeted attacks.

Read more
https://www.redseal.net/wp-content/uploads/2023/02/visualizing-entire-healthcare-attack-surface.png 627 1200 Bob Schultz, Sales Director, Mid-Atlantic https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png Bob Schultz, Sales Director, Mid-Atlantic2023-02-16 10:31:552023-02-28 12:38:16Why Visualizing the Entire Healthcare Attack Surface Is Critical

Tales from the Trenches: Vol 7 — You Can’t Always Get What You Want

2023-02-14/by Bill Burge, RedSeal Professional Services

While working with a large customer with multiple, interconnected, environments; their greatest fear was that infection in one environment might cross over one environment into the others. They had purchased a managed service, which meant I was the primary RedSeal Admin. They approached me with a request and it was obvious they were having a possible “incident”. It was obvious they didn’t want to provide TOO many details, but I’ve spent enough time on both sides of these topics that I was pretty sure what I was up against.

Read more
https://www.redseal.net/wp-content/uploads/2023/02/vol-7-tales-from-the-trenches.png 627 1200 Bill Burge, RedSeal Professional Services https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png Bill Burge, RedSeal Professional Services2023-02-14 11:38:332023-02-15 06:49:48Tales from the Trenches: Vol 7 — You Can’t Always Get What You Want
Page 13 of 31«‹1112131415›»
  • Best Practices in Cybersecurity Webinar Series
  • Between Two CTOs: Lloyd Vs. Lloyd
  • Blog
  • RedSeal Test Drive
  • Resource Center

Recent Posts

  • Cyber News Roundup for May 30, 2025

    2025-05-30
  • Cyber News Roundup for May 23, 2025

    2025-05-23
  • OT Networks Under Siege: The Hidden Risks—and How to Address Them with or without RedSeal

    2025-05-22
  • Cyber News Roundup for May 16, 2025

    2025-05-16
  • Cyber News Roundup for May 9, 2025

    2025-05-09

Blog Archive

Get the latest news, invites to events, and threat alerts

Platform

  • RedSeal Platform
  • Solutions
  • CTEM
  • Integrations

Services

  • CTEM
  • Professional Services
  • Customer Support
  • RedSeal University
  • Remote Workforce

Government

  • DoD
  • Civilian
  • Intelligence
  • State and Local
  • Government Solutions
  • Government Partners
  • Government Resources

Partners

  • Commercial Partners
  • Government Partners
  • EMEA Distributors
  • MSSP Partners
  • Technology Integration Partners
  • Partner Portal

Company

  • About RedSeal
  • Leadership
  • Careers

Resources

  • Blog
  • Events
  • Resource Center
CONTACT US
RedSeal Japan
Distinguished Vendor badge 2025

© Copyright by RedSeal, Inc. All Rights Reserved.
  • Link to X
  • Link to LinkedIn
  • Link to Youtube
  • Link to Rss this site
  • Standard Agreements
  • Terms of Use
  • Privacy Policy
  • Section 508 Policy
Scroll to top Scroll to top Scroll to top

In order to provide you with the best experience possible we might sometimes track information about you. Sometimes this may involve writing a cookie. We use this information for things like experience enrichment, analytics and targeting advertising. We recommend allowing these functions to get the most out of your experience.

OK

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Accept settingsHide notification only
Footer
Connect on LinkedIn