Thought Leaders in Cybersecurity | Blog | RedSeal
RedSeal
  • Platform
    • RedSeal Platform
    • Solutions
      • Network Visualization
      • Compliance
      • Risk Prioritization
    • CTEM
    • Integrations
  • Services
    • CTEM
    • Professional Services
    • Customer Support
    • RedSeal University
    • Remote Workforce
  • Industries
  • Partners
    • RedSeal Partners
    • Partner Portal
  • Company
    • About RedSeal
    • Leadership
    • Careers
  • Resources
    • Blog
    • Cyber Threat Hunts
    • Events
    • Resource Center
  • Contact Us
  • GET A DEMO
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

BLOG

A Resilient Infrastructure for US Customs and Border Protection

2020-03-13/by Wayne Lloyd, Federal CTO, RedSeal

The Customs and Border Protection agency recently announced an official 2020-2025 strategy to accomplish their mission to “protect the American people and facilitate trade and travel.”

The strategy comprises only three goals, one of which is to invest in technology and partnerships to confront emerging threats. This includes an IT Infrastructure that provides fast and […]

Read more
https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png 0 0 Wayne Lloyd, Federal CTO, RedSeal https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png Wayne Lloyd, Federal CTO, RedSeal2020-03-13 10:27:022020-05-18 17:01:04A Resilient Infrastructure for US Customs and Border Protection

Security Orchestration and Automation Response Solutions (SOAR) and RedSeal

2020-01-29/by Wayne Lloyd, Federal CTO, RedSeal

Over the past few years, Security Orchestration, Automation, and Response (SOAR) tools have emerged as multi-faceted and ever-present components in a Security Operations Center (SOC), enabling security teams to centralize incident management, standardize processes, and reduce response times through automation and artificial intelligence (AI).

The security orchestration, automation and response (SOAR) market, as defined by […]

Read more
https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png 0 0 Wayne Lloyd, Federal CTO, RedSeal https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png Wayne Lloyd, Federal CTO, RedSeal2020-01-29 15:32:042023-01-20 11:15:35Security Orchestration and Automation Response Solutions (SOAR) and RedSeal

Ten Cybersecurity Fundamentals to Reduce Your Risk of Attack

2020-01-08/by Wayne Lloyd, Federal CTO, RedSeal

Due to escalating tensions with Iran and recent cyber activity against a U.S. Government website, DHS’s Cybersecurity and Infrastructure Security Agency team has issued a bulletin warning organizations to be prepared for “cyber disruptions, suspicious emails, and network delays.” DHS recommends preparing by focusing on “cyber hygiene practices” to defend against the known tactics, techniques and […]

Read more
https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png 0 0 Wayne Lloyd, Federal CTO, RedSeal https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png Wayne Lloyd, Federal CTO, RedSeal2020-01-08 11:22:062020-01-08 11:41:02Ten Cybersecurity Fundamentals to Reduce Your Risk of Attack

CDM Experts: Data Collection, Classification, Analysis Are Keys

2019-09-26/by Lauren Stauffer

Recently, RedSeal Federal CTO Wayne Lloyd was asked to participate in a panel organized by Meritalk on the federal government’s Continuous Diagnostics and Mitigation (CDM) program.

Wayne was joined by CDM experts from Veritas and Splunk. All offered candid assessments of the importance of data classification and collection as the CDM program moves to incorporate […]

Read more
https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png 0 0 Lauren Stauffer https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png Lauren Stauffer2019-09-26 14:27:312020-01-08 11:33:49CDM Experts: Data Collection, Classification, Analysis Are Keys

How to Identify Your Boundary Defense Needs

2019-08-19/by Kes Jecius

By Kes Jecius, RedSeal Senior Consulting Engineer

The Center for Internet Security’s (CIS) twelfth control for implementing a cybersecurity program is for your organization to control the flow of information transferring between networks of different trust levels. The first sub-control states that an organization should maintain an inventory of all network boundaries. So, the first […]

Read more
https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png 0 0 Kes Jecius https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png Kes Jecius2019-08-19 00:00:412019-08-18 21:23:44How to Identify Your Boundary Defense Needs

CIS Benchmarks Bring Network and Security Teams Together

2019-07-29/by Kes Jecius

By Kes Jecius, RedSeal Senior Consulting Engineer

The Center for Internet Security’s (CIS) eleventh control for implementing a cybersecurity program is for your organization to actively track, report on, and correct the security configurations for network devices. This involves the use of a configuration management system and robust change control processes. What has been missing […]

Read more
https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png 0 0 Kes Jecius https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png Kes Jecius2019-07-29 06:01:072019-07-29 06:32:42CIS Benchmarks Bring Network and Security Teams Together

Is Process Killing Digital Resilience and Endangering Our Country?

2019-07-02/by Wayne Lloyd, Federal CTO, RedSeal

After reading a Facebook comment on “Navy, Industry Partners Are ‘Under Cyber Siege’ by Chinese Hackers, Review Asserts,” I’m compelled to respond.

I work a lot with the Navy (and the DOD as a whole) as a vendor. I spent 26 years in the intelligence community as a contractor running datacenter operations, transitioning to cybersecurity […]

Read more
https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png 0 0 Wayne Lloyd, Federal CTO, RedSeal https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png Wayne Lloyd, Federal CTO, RedSeal2019-07-02 06:00:312019-07-01 11:29:47Is Process Killing Digital Resilience and Endangering Our Country?

Understanding and Managing Your Attack Surface

2019-06-14/by Kes Jecius

By Kes Jecius, RedSeal Senior Consulting Engineer

The Center for Internet Security’s (CIS) ninth control for implementing a cybersecurity program is for your organization to manage the ports, protocols, and services on a networked device that are exposed and vulnerable to exploitation. The intent of the control is for your organization to understand, reduce and […]

Read more
https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png 0 0 Kes Jecius https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png Kes Jecius2019-06-14 06:00:152020-09-10 15:54:58Understanding and Managing Your Attack Surface

The Network Dimension in Vulnerability Management

2019-05-16/by Kes Jecius

By Kes Jecius, RedSeal Senior Consulting Engineer

The Center for Internet Security’s (CIS) third control for implementing a cybersecurity program is to practice continuous vulnerability management. Organizations that identify and remediate vulnerabilities on an on-going basis will significantly reduce the window of opportunity for attackers. This third control assumes you’ve implemented the first two CIS […]

Read more
https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png 0 0 Kes Jecius https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png Kes Jecius2019-05-16 06:00:282019-10-03 14:33:40The Network Dimension in Vulnerability Management

Visibility of IT Assets for Your Cybersecurity Program

2019-04-25/by Kes Jecius

By Kes Jecius, RedSeal Senior Consulting Engineer

The Center for Internet Security’s (CIS) first control for implementing a cybersecurity program is to understand and manage the hardware assets that make up your IT infrastructure. These hardware assets consist of network devices, servers, workstations, and other computing platforms. This is a difficult goal to achieve, further […]

Read more
https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png 0 0 Kes Jecius https://www.redseal.net/wp-content/uploads/2016/08/RedSeal-logo.png Kes Jecius2019-04-25 05:00:032019-05-15 10:51:54Visibility of IT Assets for Your Cybersecurity Program
Page 20 of 30«‹1819202122›»
  • Best Practices in Cybersecurity Webinar Series
  • Between Two CTOs: Lloyd Vs. Lloyd
  • Blog
  • RedSeal Test Drive
  • Resource Center

Recent Posts

  • RedSeal Wins 2025 SC Awards: Best Continuous Threat Exposure Management (CTEM) Solution

    2025-05-05
  • Cyber News Roundup for May 2, 2025

    2025-05-02
  • RedSeal named SC Award Winner – Best Continuous Threat Exposure Management Solution

    2025-04-30
  • Proactive Cyber Resilience: Lessons from M-Trends and DBIR 2025 and How RedSeal Leads the Way

    2025-04-28
  • Cyber News Roundup for April 25, 2025

    2025-04-25

Blog Archive

Get the latest news, invites to events, and threat alerts

Platform

  • RedSeal Platform
  • Solutions
  • CTEM
  • Integrations

Services

  • CTEM
  • Professional Services
  • Customer Support
  • RedSeal University
  • Remote Workforce

Government

  • DoD
  • Civilian
  • Intelligence
  • State and Local
  • Government Solutions
  • Government Partners
  • Government Resources

Partners

  • Commercial Partners
  • Government Partners
  • EMEA Distributors
  • MSSP Partners
  • Technology Integration Partners
  • Partner Portal

Company

  • About RedSeal
  • Leadership
  • Careers

Resources

  • Blog
  • Cyber Threat Hunting Workshops
  • Events
  • Resource Center
CONTACT US
RedSeal Japan
Distinguished Vendor badge 2025

© Copyright by RedSeal, Inc. All Rights Reserved.
  • Link to X
  • Link to LinkedIn
  • Link to Youtube
  • Link to Rss this site
  • Standard Agreements
  • Terms of Use
  • Privacy Policy
  • Section 508 Policy
Scroll to top Scroll to top Scroll to top

In order to provide you with the best experience possible we might sometimes track information about you. Sometimes this may involve writing a cookie. We use this information for things like experience enrichment, analytics and targeting advertising. We recommend allowing these functions to get the most out of your experience.

OK

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Accept settingsHide notification only
Footer
Connect on LinkedIn