In order to provide you with the best experience possible we might sometimes track information about you. Sometimes this may involve writing a cookie. We use this information for things like experience enrichment, analytics and targeting advertising. We recommend allowing these functions to get the most out of your experience.
OK
Cyber Infrastructure – the Fifth Domain
/by Ray Rothrock, Executive Chairman, RedSealCyber Infrastructure – the Fifth Domain
The last couple of years has seen an incredible rise in reported incidents of cyber attacks. Research by many organizations, including Check Point Software and Verizon DBIR, indicate that it’s not a reporting bias, cyber attacks are indeed on the rise. The good news for us all, as […]
Security’s Nightmare: Negative Unemployment
/by Dr. Mike Lloyd, CTO, RedSealUnemployment is bad, so negative unemployment must be good, right? Um, no. (I’ll steal a line from Douglas Adams: “It’s unpleasantly like being drunk” … “What’s so unpleasant about being drunk?” … “Well, ask a glass of water.”) Security as an industry is short-staffed – critically so, and it’s getting worse.
This came into sharp […]
Calling in the security experts – your network engineers
/by Roberta Gray, Vice President Marketing RedSealI’ve talked about the need to consider your network as the key to improving cyber defenses. Here’s why.
Today’s attacks are “system-level”, supplanting specific server or host exploitations. Cybercriminals today develop sophisticated attack strategies by:
Finding PATHWAYS INTO the network through phishing emails, third parties, or other creative ways. MOVING MALWARE AROUND the network while […]
Securing Your Network, or Networking for Security?
/by Roberta Gray, Vice President Marketing RedSealEvery day we hear about another breach, and most of the time the information we get is fairly consistent – the breach started and finished long before it was discovered. It’s not always clear exactly how or where the attackers were able to get access because they’ve had ample time to cover their tracks. Whatever […]
One Billion Dollars
/by RedSealDo I have your attention?
I was sitting in a hotel restaurant having breakfast overlooking the Sydney harbor the morning I read the story a couple weeks ago. While it’s half a world away and it may not have crossed your radar, the cost of the breach of the South Korean national identification database is […]
Top 5 Network Security Best Practices
/by RedSealAs I sat in one of RedSeal’s headquarters conference rooms last week discussing with two customers their approach to securing their networks, I was reminded how, even in the midst of our diversity, there are some fundamental truths about security and best practices. eWe’ve come up with five of the top network security best practices.
[…]
Anticipating attack: top 10 ways to prevent a breach
/by RedSealLast week, I spent most of my time in a conference room at RedSeal headquarters presenting our RedSeal Certification training to a mix of our customers and recent additions to the RedSeal team. Showing those in attendance the broad set of capabilities of the system reminded me how important it is to be very clear […]
How Does the Cloud and Mobility Change Things?
/by RedSealI remember sitting in a data center deep in an IBM facility in the early 1990s typing access control into a Proteon router that we had installed for our first commercial Internet link at that site. The controls were rudimentary, and severely limited access from outside. No one but I could access most of the […]
Testing the Policy
/by RedSealThe day was already hot with the humidity rising as I entered the data center for our third day of consulting. The NOC was state-of-the-art, dimly lit, with displays showing network status, weather, and news. This was the day we would see the results of testing the network policy for the first time. I knew […]
Mapping Policy to Your Network
/by RedSealA few years ago, I sat in an otherwise empty classroom inside the administration building of a children’s hospital with two members of their security team. We stared at a spreadsheet and a document that described the server and client zones of their network, displayed from a projector like a classroom project. For each zone, […]