Tag Archive for: Mike Lloyd

What’s in Store? Cybersecurity in 2020

TahawulTech | January 2020 (Page 12)

What do you think will be the key drivers for security spending?

We are mid-way through the transition to the cloud, leaving most networks as a complex hybrid. Managing that complexity will be a major spending driver. Another key driver is compliance as the regulatory landscape continues to evolve, new regulations will drive spending. Lastly, cyber insurance will increase in importance in 2020, and this will steer spending towards defences that insurance providers want to see, in much the same way that car insurance drives car safety features. – Mike Lloyd, RedSeal CTO

12 Strategies To Get Your Staff To Stay On Top Of Software Updates

Forbes | January 16, 2020

A big irony in security is that the more critical a system is, the less likely it is to be patched well! To keep critical systems available, teams often deprioritize security. While security is abstract, an unavailable system is tangible and immediate. Security teams need to make the risk real so downtime seems necessary. Provide specific, personalized scenarios for why the action matters. – Mike LloydRedSeal

Can the UK government’s efforts solve the cyber skills gap?

Computer Weekly | December 30, 2019

The scarcity of skilled cyber security workers in Europe is getting worse, with just under two-thirds of employers saying they are now short of staff, according to the latest report from (ISC)2.

Mike Lloyd, chief technology officer at cyber risk modelling platform provider RedSeal, says that what is required is a mix of “base technical skills, which means learning how the modern digital world works, for example, how websites can be attacked”, and developing an “adversarial mindset, which takes years of experience in playing cat and mouse games”.

Tips and Guidance For Educational Entities To Ensure The Safety and Security of Their IT Data

Education IT Reporter | December 17, 2019

Schools are especially prone to ransomware attacks, due to the combination of weak security protocols, out of date computer equipment, and a lack of skilled staff. Digital infections can spread among school computers much the same as biological germs spread among students. Security is unfortunately quite a lot like a treadmill – it never stops. You can never arrive at a state of solid protection, because what was good enough yesterday won’t be good enough tomorrow. New vulnerabilities are continually being found. The need to invest in basic online hygiene is constant.

Securing the Supply Chain Against Cyber Disruption

Loss Prevention Magazine | December 11, 2019

Just like a physical chain, a supply chain is only as strong as its weakest link. Today’s issues are about networks of interdependence. We extract major economic benefits from modern supply chains, because each organization can focus on its core mission or specialty. This narrowing of focus is very effective, allowing each organization to be the best at whatever it does—making widgets, transporting them, or adding value by assembling parts made by other specialists. But this same narrowing of focus on just one aspect of a system means the system as a whole becomes fragile.

The smart tech threat to CEOs

TechRadar | November 7, 2019

The cybersecurity industry talks a lot about the importance of “board-level buy-in” for projects and a security-by-design culture led from the “top down”. What does that actually mean? It means CEOs and senior managers who “get” security: leaders who know that security done right can be a competitive differentiator and growth driver, not a block on innovation.

The reality is that most still do not.

Hackers access Bed Bath & Beyond customer data

Digital Commerce 360 | October 31, 2019

For a shopper who was impacted, she should ensure she doesn’t use the same password for her Bed Bath & Beyond account elsewhere. In fact, not reusing passwords is one way consumers can protect themselves from fraud, says Mike Lloyd, chief technology officer from cyber security firm RedSeal Inc.

“It’s important to realize that if you use the same password at your bank as you use for less important services like social media or video streaming, then a bad guy only has to break into whichever company has the weakest security, then steal your passwords and use them everywhere else you go,” Lloyd says.

What Do You Do When You Can’t Patch Your IoT Endpoints?

Dark Reading | October 29, 2019

Question: What do you do when you can’t patch your IoT endpoints?

Dr. Mike Lloyd, CTO of RedSeal: Internet of Things devices are great because they aren’t as complicated as phones, laptops, or servers. General-purpose computers cause headaches. Unfortunately for security, IoT devices are also a curse for the same reason – precisely because they aren’t flexible. The security toolchain and ecosystem we’ve built up assumes we can put stuff on network endpoints, but IoT “things” are different. Agents? Scanning? Patching? Antivirus? None of that works in the new world of IoT widgets. Worse, many of these devices are built en masse by companies focused on price point, with no intention of supporting patching.

Oracle’s Autonomous Cloud Security Claims Met with Skepticism

DataCenter Knowledge | September 25, 2019

Last week, Oracle co-founder and CTO Larry Ellison claimed that Oracle’s new autonomous systems will eliminate all data breaches. Not everyone’s buying it….

Mike Lloyd, CTO of cybersecurity vendor RedSeal, called Oracle’s latest promises an example of “hyperbolic marketing.”

“People find clouds inherently confusing, not least when trying to understand who is responsible for what,” he said. “Of course, if you think your cloud vendor is responsible for some aspect of security, but they think you’re responsible for it, then you’re on a road to a bad place.”

Intelligent CISO: Security in the data centre

Intelligent CISO | Issue 17 / Page 50