In order to provide you with the best experience possible we might sometimes track information about you. Sometimes this may involve writing a cookie. We use this information for things like experience enrichment, analytics and targeting advertising. We recommend allowing these functions to get the most out of your experience.
OK
Change Management Processes are Critical — From Nuclear Submarines to Your Network
/by Landon Brock, Product Manager, RedSealHow often have you made a network change that didn’t work the way you expected or even created a new issue? The list of configuration changes needed to build, maintain, and secure a network is daunting. It’s all too easy to act without thoroughly thinking through and considering the impact on the whole network. Initially […]
To Recover and Rebuild, Look to Technology
/by Ray Rothrock, Executive Chairman, RedSealAs I write this, our society is amid an economic collapse and social closure the likes of which no one in our lifetime has ever seen. People everywhere are trying to create some kind of certainty so that they can plan their future, get back to their “day job” and feel safe while resuming a […]
Know What to Protect and Why
/by Kurt Van Etten, Chief Product Officer, RedSealIn my last article, I discussed the importance of walking the terrain, or knowing your network. I suggested beginning at the at high level: identify your sites, then group your assets by site or facility. This is a great place to start understanding your network because network controls tend to be fairly static. However, discovering […]
Best Practices for Cyber Resilience: Step One, Walk the Terrain
/by Kurt Van Etten, Chief Product Officer, RedSealYou’ve been asked to defend your organization from a myriad of threats: state sponsored attacks, cyber criminals, insiders. But where do you start?
Many years ago, as a young Marine lieutenant I learned that the first step to establishing a defense is to understand what you’re defending. You must know the terrain. Walk the terrain. Understand the key parts […]
Real World Versus Cyber Hygiene
/by Wayne Lloyd, Federal CTO, RedSealAs I watch the drama on the news unfold it is striking to me how similar the tactics for defending against a spreading virus are to cyber defense.
Washing your hands equates almost exactly to cyber hygiene tactics like patching.
Social distancing is nothing more than putting barriers up to prevent the spread of attacks, […]
A Resilient Infrastructure for US Customs and Border Protection
/by Wayne Lloyd, Federal CTO, RedSealThe Customs and Border Protection agency recently announced an official 2020-2025 strategy to accomplish their mission to “protect the American people and facilitate trade and travel.”
The strategy comprises only three goals, one of which is to invest in technology and partnerships to confront emerging threats. This includes an IT Infrastructure that provides fast and […]
Security Orchestration and Automation Response Solutions (SOAR) and RedSeal
/by Wayne Lloyd, Federal CTO, RedSealOver the past few years, Security Orchestration, Automation, and Response (SOAR) tools have emerged as multi-faceted and ever-present components in a Security Operations Center (SOC), enabling security teams to centralize incident management, standardize processes, and reduce response times through automation and artificial intelligence (AI).
The security orchestration, automation and response (SOAR) market, as defined by […]
Ten Cybersecurity Fundamentals to Reduce Your Risk of Attack
/by Wayne Lloyd, Federal CTO, RedSealDue to escalating tensions with Iran and recent cyber activity against a U.S. Government website, DHS’s Cybersecurity and Infrastructure Security Agency team has issued a bulletin warning organizations to be prepared for “cyber disruptions, suspicious emails, and network delays.” DHS recommends preparing by focusing on “cyber hygiene practices” to defend against the known tactics, techniques and […]
CDM Experts: Data Collection, Classification, Analysis Are Keys
/by Lauren StaufferRecently, RedSeal Federal CTO Wayne Lloyd was asked to participate in a panel organized by Meritalk on the federal government’s Continuous Diagnostics and Mitigation (CDM) program.
Wayne was joined by CDM experts from Veritas and Splunk. All offered candid assessments of the importance of data classification and collection as the CDM program moves to incorporate […]
How to Identify Your Boundary Defense Needs
/by Kes JeciusBy Kes Jecius, RedSeal Senior Consulting Engineer
The Center for Internet Security’s (CIS) twelfth control for implementing a cybersecurity program is for your organization to control the flow of information transferring between networks of different trust levels. The first sub-control states that an organization should maintain an inventory of all network boundaries. So, the first […]