In order to provide you with the best experience possible we might sometimes track information about you. Sometimes this may involve writing a cookie. We use this information for things like experience enrichment, analytics and targeting advertising. We recommend allowing these functions to get the most out of your experience.
OK
Staying on Top of Security
/by Ray Rothrock, Executive Chairman, RedSealWall Street values companies based on their performance over time. That performance is measured in revenue growth and profit, but it is also measured by the reliability with which results can be predicted. Predictable results makes everyone happy. Wall Street doesn’t like surprises, and neither does a CEO. At some level, I suppose, the CEO’s […]
Was It Something I Said?
/by RedSealI was in one of those small, interior conference rooms when it first happened. It was very hot outside, with an obvious threat of another day over 100°F and extreme humidity, as well. But, it felt even hotter in the room. I was there to provide insights to members of the network and security teams […]
Identify and Close Before the Bad Actor Exploits
/by RedSealIt happened again yesterday. I was taking a break on my back porch and listening to the Colorado summer rain when an alert hit my phone: news of another breach. They seem to be coming with a disturbingly increasing regularity and with ever more serious consequences. For example, one company, Code Spaces, was completely destroyed […]
The Reality Gap
/by RedSealA couple years ago in a conference room with a window looking out on the Arizona desert, two of us sat down with a customer to talk about their network. I asked to see their best network diagram, which he left to retrieve. When he returned, he rolled it out to its full length on […]
We’re Living in Mud Huts
/by Ray Rothrock, Executive Chairman, RedSealIn the modern world, we depend on so many standards to protect us in our everyday lives – without even realizing it. For example, when we walk into a building we expect it will not fall down, even in an earthquake. But before we walk in, we don’t demand to see the drawings, the engineering, […]
What Keeps CEOs Up at Night?
/by Ray Rothrock, Executive Chairman, RedSealPost 3 – What keeps CEOs up at night?
As a CEO, getting a good night’s sleep is harder and harder these days. We used to worry about competition, labor problems, regulatory issues, financing issues, sales and, if our company was public, our stock price. In the 21st century there is a new worry – […]
Somewhere Over the Spreadsheet
/by RedSealTwo years ago I was standing in front of a group of security geeks in Santa Barbara for BSides LA talking about the sophisticated tools that most network engineers use — like “ping” and “traceroute” and even Excel — and about how the broad range of tools available typically didn’t get used in a primordial […]
JIE-READY STEP 4: Develop artifacts for IA and ATO
/by Brandon Hoffman, Federal CTO RedSealThe design and implementation phases of JRSS and JIE will, very likely, receive a significant amount of scrutiny from Information Assurance (IA) to ensure that numerous standards and guidelines are followed. The goal of this scrutiny is to obtain an Authorization to Operate (ATO). There are many different components of the IA process and developing […]
JIE-READY STEP 3: Visualize before migration
/by Brandon Hoffman, Federal CTO RedSealThe phase between design and implementation for JRSS and JIE is critical. During this phase the most important thing is to have full visibility of the entire JIE infrastructure, even before it is migrated. RedSeal provides the bridge mechanism needed during this critical assessment phase.
Visualization can lead to deeper understanding of the current behavior […]
Another Day, Another Breach
/by RedSealOn Wednesday, August 20th, UPS announced that a breach may have compromised customer data during up to 105,000 transactions between January and August. While UPS is to be commended for coming forward so quickly, this breach underscores the truth that organizations with highly sophisticated and advanced capabilities in information technology aren’t inoculated against breaches. It […]