Posts

13 Things Tech Leaders Need To Do To Prepare For Decentralization

Forbes Technology Council |  June 30, 2020

3. Remain in control with automation.

“Decentralized” should not mean “out of control.” You still need controls between your crown jewels and your users (both wanted and unexpected). The old medieval castle model didn’t work, but this means there are more perimeters everywhere now. You need automation to keep up and verify you’re only allowing the right access. You’re the mayor of a digital city, not the guard of a stone fort. – Mike LloydRedSeal

The Security Interviews: What CISOs can learn from Covid-19

Computer Weekly |  June 30, 2020

Mike Lloyd, CTO at Redseal, holds 21 cyber security patents and a PhD in stochastic epidemic modelling from Heriot-Watt University in Edinburgh, so is probably the man to talk to when it comes to cyber security in the world of Covid-19.

More than three months into the global Covid-19 coronavirus pandemic, we have all become familiar with the advice on how not to catch this mysterious and horrible disease, which some people seem to be able to shake off with ease, but for thousands of other survivors now appears to have life-changing consequences.

Digital Preparedness for Health Care

Health Tech Digital | June 23, 2020

Being prepared for the unknown is as important to the digital side of healthcare as it is to the medical side. Both require knowing your resources, preparing for likely scenarios and following good hygiene practices for advanced planning, health maintenance, and rapid intervention. There are established protocols in medicine and for digital infrastructure. The Center for Internet Security (CIS) publishes Critical Security Controls, which serve as a widely agreed upon set of solid, proven approaches to cyber readiness.

These start at the most basic level – understanding your inventory.

COVID-19 + Cybersecurity: Parallels and Lessons from a Pandemic

Nuclear Threat Initiative |  June 17, 2020

The following is a conversation between Dr. Mike Lloyd, an epidemiologist-turned-Chief Technology Officer of RedSeal, and Ray Rothrock, member of the NTI Board of Directors and its Science and Technology Advisory Group, and author of “Digital Resilience: Is Your Company Ready for the Next Cyber Threat.”

Ray: Mike, you’re a rare guy: you have both a PhD in epidemic modeling, and a long career in cybersecurity. Now both of your careers are relevant. Does this pandemic have anything to teach cybersecurity and technology?

What is the safest way to buy online?

Credit Donkey |  June 8, 2020

“Never re-use a password when shopping online from new sites. It’s practically impossible to remember all your passwords, but it’s really important to make sure a data breach on one store doesn’t affect your other accounts, so this is why it’s important to use some kind of password manager. I know I can’t remember all my passwords – I have to use software to do it for me,” said Mike Lloyd, RedSeal CTO.

AI is a double-edged sword for cybersecurity firms

San Francisco Business Times |  May 19, 2020

The world of cybersecurity is a war between cybercriminals attacking company computers and the protective measures installed by security companies. And fighting on both sides of this battle is artificial intelligence.

“Current AI mechanisms (machine learning and deep learning) are good at spotting patterns that they have been trained to recognize, but are bad at novel patterns, despite vendor claims, and are hopeless at generalizing or finding root causes,” said Mike Lloyd, CTO of RedSeal.

Lessons for Cybersecurity From a Pandemic

Business Security Weekly |  May 12, 2020

The coronavirus has focused the world’s attention on disease spread like never before. This discussion will draw out some of the parallels that can inform how we do our work in cybersecurity, and that are helpful in communicating with the people who pay the bills. All the new vocabulary around “social distancing”, “contact tracing”, and “flattening the curve” is useful for our discussions in cybersecurity.

15 Effective Cybersecurity Strategies For Your Remote Workforce

Forbes | May 12, 2020

10. Know your access points.

The rush to work from home is a situation in which the prepared do better. It’s critical to keep an up-to-date network map to handle whatever comes along. For example, show where your VPN access points are and whether they have the correct access. Most organizations struggle to maintain a reliable map of their changing world, but it can be automated. – Mike LloydRedSeal

What are the security priorities for the post-coronavirus world?

Computer Weekly |  May 11, 2020

Earlier in 2020, Computer Weekly and TechTarget published the results of our annual IT Priorities study, a wide-ranging look at what is currently top of mind for IT buyers. Amid overall softening budgets across the IT landscape, the survey reported that security and risk management were easily top of the heap, with cyber security coming to be seen as more important than cost.

For Redseal CTO Mike Lloyd, who besides 21 patents in cyber security holds a PhD in stochastic epidemic modelling, the future of security after Covid-19 looks uncertain, but then, he adds, isn’t the future always uncertain?

Hidden Threats

TahawulTech |  May 2020 (Pages 28-30)

With the increasing number of employees bringing their devices to work and utilising new software solutions and cloud services to boost productivity, shadow IT is becoming one of the most common problems companies face today. Dr. Mike Lloyd of RedSeal if one of several industry experts asked about the risks and how organisations can mitigate them.