In order to provide you with the best experience possible we might sometimes track information about you. Sometimes this may involve writing a cookie. We use this information for things like experience enrichment, analytics and targeting advertising. We recommend allowing these functions to get the most out of your experience.
OK
JIE-READY: A roadmap
/by Brandon Hoffman, Federal CTO RedSealThe United States Department of Defense Joint Information Environment (JIE) began to take shape in 2010, as part of efficiency initiatives to consolidate Defense IT infrastructure and generate savings, provide full situational awareness across all defense networks, and improve the Department’s ability to share information between the services and with its industry partners and other […]
Breaches Reach the Board Room
/by Ray Rothrock, Executive Chairman, RedSealThe discussion of cyber security is finding its way into the board room. Everyone has read about a breach like the ones at Target, or Neiman Marcus, or Sony. They also probably now have the word “Heartbleed” in their lexicon whereas six months ago most people would have thought this was a medical condition. Directors […]
The Weakest Link
/by RedSealToday, TrendMicro announced their discovery of Emmental, proof that “…online banking may be full of holes.” The focus of the attack is on users of online banking, and it, like many of the current attacks, starts with a phishing attack on consumers. The New York Times Bits Blog covered the report, as well, providing a […]
Is Nothing Sacred Anymore?
/by Dr. Mike Lloyd, CTO, RedSealIt’s unthinkable: hackers targeting that sacrosanct American institution, the sports team? The recent incident in which the Houston Astros’ internal trade discussion were hacked and posted on the Internet shows that, today, no target is off limits. Jeff Luhnow, GM for the Astros, was quite right when he said: “It’s a reflection of the age […]
Congratulations on StubHub Arrests
/by Robert Capps, Senior Director, Customer Success RedSealI would like to offer my congratulations to the private and public entities that participated in the recent investigation and arrests of cyber criminals in New York City, Ontario, Canada, and London, United Kingdom. A tremendous amount of hard work and dedication from all parties is required to successfully dismantle an international criminal enterprise. The […]
A Question of When, not If
/by Ray Rothrock, Executive Chairman, RedSealBreached! This is the new watchword in the executive office suite these days. Ever since Brian Krebs revealed to the world that Target had been breached, every company is on notice. While the primary role of the CEO is revenue and growth, there are a host of other activities that support revenue and growth. […]
Project Zero – A Smarter Way Forward
/by Dr. Mike Lloyd, CTO, RedSealGoogle’s move to set up Project Zero is very welcome. The infrastructure on which we run our businesses and our lives is showing its fragile nature as each new, successful attack is disclosed. Unfortunately, we all share significant risks, not least because IT tends towards “monoculture”, with only a few major pieces of hardware and […]
Your Security Has Been Compromised
/by RedSealOn an autumn day in 2008 while I was an active, practicing journalist, I sat in my office and interviewed Todd Davis, CEO of LifeLock for my article on scanning the underbelly of the web. Todd is perhaps best known for appearing in ubiquitous advertising and broadcasting his Social Security Number. At the time, it […]
Driving Blindfolded
/by Dr. Mike Lloyd, CTO, RedSealI recently wrote about the necessity of getting the right data for security analytics. But I’m continuously reminded how typical organizations lack an even roughly complete understanding of their network, or even a map of it. I can understand why this happens – entropy is just as inevitable for organizations as it is in Physics. […]
Inside the Mind of an Attacker — Part 2
/by RedSealRecently, on a rainy Colorado afternoon, I sat down at my kitchen table to decide how I was going to upgrade our home security system. Just as anyone who has gone through this process would do, I walked around the house and looked at all of the possible ways an intruder could attempt to enter. […]