In order to provide you with the best experience possible we might sometimes track information about you. Sometimes this may involve writing a cookie. We use this information for things like experience enrichment, analytics and targeting advertising. We recommend allowing these functions to get the most out of your experience.
OK
Network Segmentation, Security and RedSeal
/by Wayne Lloyd, Federal CTO, RedSealOver the last few decades, many network security architecture products have come to market, all with useful features to help secure networks. If we assume that all of these security products are deployed in operational networks, why do we still see so many leaks and breaches?
Some say the users are not leveraging the full capabilities […]
Leading Federal Cybersecurity Experts Agree: Federal Agencies Need Integrated and Automated Approach
/by RedSealRecently RedSeal hosted its annual Federal Customer Forum. One of the panels featured a discussion with several luminaries in the federal government cybersecurity ecosystem. The topic: the importance of the integration and automation of cybersecurity operations.
Those present were:
Wayne Lloyd, RedSeal (Moderator) Kevin Phan, Splunk Tim Jones, ForeScout Wade Woolwine, Rapid7 John America, Mystek […]
Being Digitally Resilient in the Face of HIDDEN COBRA
/by Emil Kiner, Sr. Product ManagerWatch Video: RedSeal and Hidden Cobra Overview, Use Cases and Demo
Introduction
On November 17th, the United States Computer Emergency Ready Team (US-CERT), in conjunction with the FBI, released a pair of advisories about the North Korean hacking and espionage campaign code named HIDDEN COBRA. The latest advisories describe two pieces of […]
Uber Hack: A Bad Breach, But A Worse Cover-Up
/by Dr. Mike Lloyd, CTO, RedSealThe Uber hack is a public lesson that a breach may be bad, but a cover-up is worse. (See Nixon, Richard.) It was a foolish mistake to try to hide an attack of this scale, but then, the history of security is a process where we all slowly learn from foolish mistakes. We live in […]
What Equifax Tells Us About Cybersecurity
/by Guest bloggerBy Richard A. Clarke
This month it is Equifax. Previously it was Yahoo and before that Target. Each new breach seems to set a new record of how many pieces of personal identifiable information have been compromised. It is easy to get inured to these news stories, especially since the media generally does not deduce […]
Protecting PHI, Challenges and Solutions for Healthcare
/by Nate L. Cash, Senior Director, Federal Professional Services/ Director of Information SecurityWhat is data worth? On the surface, it is just a bunch of 1s and 0s on a hard drive. Most users don’t think about or even fully understand data. Their cell phones work, email is at their fingertips, and a friend is just a video chat away. But, enormous companies are built using […]
Keep Up with the Basics
/by Dr. Mike Lloyd, CTO, RedSealI just came across a WSJ Pro article titled “Inside the NSA: Companies Need to Follow the Basics,” and figured I could offer an “amen.” The NSA gets points for seeing things clearly – but then, I suppose that is their job, whether we like it or not! The area they discuss isn’t easy to write […]
Vulnerabilities: The Weeds of Your Digital Terrain
/by Jeff GreeneIn the warmer months when I’m not traveling I often get up early and wander my property pulling and spraying weeds. This is an endless and thankless task, yet a necessary evil to preserve my investment and maintain appearances. I am amazed how quickly weeds grow and by the places they find purchase. In […]
Advice from Hackers at Black Hat
/by Nate L. Cash, Senior Director, Federal Professional Services/ Director of Information SecurityAt the recent Black Hat USA conference, CIO asked 250 self-identified hackers for their opinion on security solutions. The answers are a good indicator for what works to protect your organization. Of all the technologies out there, the responders identified multi-factor authentication and high-level encryption as the two that are hardest to get past […]
Defense Medical Communities Face Digital Resilience Challenges
/by Matt VendittoLast week in Orlando, I attended the Defense Health Information Technology Symposium (DHITS) conference. This is one of the best attended, most cohesive trade shows I have been to in years. One of the eight break-out tracks was entirely devoted the challenges of securing defense health networks and the medical devices that connect to […]