Posts

Hidden Threats

TahawulTech |  May 2020 (Pages 28-30)

With the increasing number of employees bringing their devices to work and utilising new software solutions and cloud services to boost productivity, shadow IT is becoming one of the most common problems companies face today. Dr. Mike Lloyd of RedSeal if one of several industry experts asked about the risks and how organisations can mitigate them.

Security best practices in a time of pandemic

ITProPortal | May 6, 2020

In a world where everything is changing, how should a CISO keep up? The big challenge in security, as in so many other fields right now, is uncertainty.  How will a recession impact your business?  When will people come back to the office? Will they come back?  In your rush to support remote workers, did you build out reliable infrastructure that will stand the test of time, or did your organisation rush to make the online equivalent of a shanty town, with jury-rigged connectivity and rushed security controls?

Top 10 Cyber Incident Response Mistakes and How to Avoid Them

Dark Reading | May 6, 2020

Automation can make a big difference in the efficacy and efficiency of an IR program. The trick is figuring out just the right level of automation to cut out the low-value manual work while still leaving the tasks better-suited to human judgment in the care of smart analysts.

“Some organizations underautomate and get lost in the slog because IR is hard,” says Dr. Mike Lloyd, CTO of RedSeal. “Others overautomate, not realizing that machine reasoning still falls short and is easily defeated by a human who knows they only need to beat a machine, not another human.”

4 Cybersecurity Lessons from the Pandemic

Dark Reading | April 16, 2020

An epidemiologist-turned-CTO describes the parallels between the spread of a computer virus and the real-world coronavirus.

I switched from epidemiology to network security as my day job years ago, but today’s pandemic reminds me of the similarities between the two fields. There are many lessons we can take from the real-world virus and apply them to security in the online world.

Securing the Supply Chain

CXO Insight ME | March 2020 (Pages 36-37)

Dr. Mike Lloyd, CTO at RedSeal, on how to protect your supply chain from cyberattacks.

“The supply chain combatted the challenge of repeatable quality through standards and audits – organisations establish baselines of what it takes to make a reliable product, and then build the supply chain around those who can meet the standard. The time has come for comparable efforts around cybersecurity and digital resilience across the supply chain.”

What coronavirus can teach us about network security

ITProPortal | March 18, 2020

In my travels, I’ve met cybersecurity professionals from many different backgrounds. That’s not so surprising – it’s a relatively new profession only recently taught in universities, and it takes on the order of ten years of on-the-job training to become an expert. Most seasoned cybersecurity veterans came from some other discipline. I moved into cybersecurity from epidemiology, studying how disease spreads. There are some surprising and interesting parallels between cybersecurity and epidemiology – starting from the point that most people really don’t want to talk to you about the icky stuff that you spend your time on until they face a real crisis and suddenly demand answers!

Why Aren’t Smart Devices Safer?

Forbes | March 6, 2020

We live in a world of rapid technological change. Consumers have adopted smart home devices at amazing (some might say alarming) speeds. Businesses have rushed to the cloud, to digitalization and to the latest artificial intelligence approaches. Each of these changes is driven by big benefits but also comes with a great deal of risk.

Securing the Cloud with Smart SMB

Sm@rt SMB | February 2020 (Pages 13-14)

Mike Lloyd, CTO, RedSeal says, “There was a lot of fear at first that cloud would be less secure, but those fears were unfounded. In general, cloud providers do a great job, and they do it full time, 24×7. There have been no recent incidents that can be pinned on a cloud provider failing to do their job.”

He cautions that this does not mean the cloud is perfect safe and there certainly have been cloud breaches that were the fault of the company buying those cloud services.

Charting a Path to Hybrid Cloud Security

Nutanix Blog  | February 20, 2020

The majority of IT pros worldwide consider the most secure IT operating environment to be the hybrid cloud, according to recent research. In a hybrid cloud, some applications and workloads run in private cloud infrastructure, either on-premises or in a third-party hosting environment, while others reside in the public cloud.

…”Competitors that are building clouds all offer different services, with different complex details, and different skills required,” said Dr. Mike Lloyd, RedSeal CTO.

Competing management systems are one issue. Because each vendor innovates and builds its own management layer, effectively maintaining a hybrid environment means that “every IT organization has to become fluent in multiple languages at once,” according to Lloyd.

Huawei warning: Expert reveals how spy could EASILY hack into UK’s 5G network

Daily Express | February 8, 2020

Boris Johnson’s decision to allow Huawei continued access to the UK’s 5G network could lead to a serious threat to the country, a leading expert has warned.The Chinese firm will be allowed to access 35 percent of the UK’s network, which includes its radio networks. Huawei will also be banned from supplying “sensitive” parts to the network, the UK Government revealed last month.

Mr. Johnson declaring there will be limits to Huawei’s access, speaking to Express.co.uk, Dr. Mike Lloyd, security expert and CTO at RedSeal, warned 35 percent is a “huge amount” for any potential spy.