Experts Debate the Key Points of the Final Obama Cybersecurity Report

TECH TARGET | SEARCH SECURITY | December 7, 2016

The final cybersecurity report for the Obama administration identified six key issues for improving cybersecurity and recommended actions to make positive changes, but experts disagree on the key points and whether the recommendations will be heeded by the incoming administration.

Cybersecurity Pros Tell Trump to Heed Commission’s Recommendations

SC Magazine | December 6, 2016

Cyber industry executives are weighing in on the presidential Commission on Enhancing National Cybersecurity’s  Report on Securing and Growing the Digital Economy identifying several areas they feel the commission nailed when it comes to improving our nation’s cybersecurity and what the upcoming Trump administration needs to focus upon.

Goodby SIEM, Hello SOAPA

NETWORK WORLD | November 29, 2016

Security Information and Event Management (SIEM) systems have been around for a dozen years or so. During that timeframe, SIEMs evolved from perimeter security event correlation tools to GRC platforms to security analytics systems. Early vendors such as eSecurity, GuardedNet, Intellitactics and NetForensics are distant memories. Today’s SIEM market is now dominated by a few leaders: LogRhythm, McAfee (aka: Nitro Security), HP (aka: ArcSight), IBM (aka: QRadar) and Splunk.

APQC: Managing Cyber Security Risk in Corporate Networks

APQC | November 28, 2016

Cyber security risk today is a deep concern for a broad spectrum of senior executives, not just the CIO’s top team members. The heads of finance, ERM, strategic planning, marketing, and field operations have to be up-to-speed. Board members as well are accountable for ensuring organizational resiliency. In this Q&A, APQC presents ideas for managing this risk from two experts: Ray Rothrock, RedSeal CEO, and Steve Timmerman, RedSeal VP of Business Development.

Smart Devices are Simple When it Comes to Cybersecurity

CBR ONLINE | 14 November 2016

RedSeal CTO, Dr Mike Lloyd, on the thing about things – with some pizza on the side

The Mirai strain of malware has focused a lot of attention on the Internet of Things, after a Mirai-infected botnet of IoT devices was used to cripple large parts of the Internet on Oct 21st.  Huge numbers of simple Internet-connected devices (cameras, home routers, baby monitors, etc) were used to flood the infrastructure of a service provider called Dyn, causing collateral damage to a wide array of other dependent websites.

Former Check Point CMO Parrish Lands At RedSeal

CRN | November 17, 2016

RedSeal has nabbed former Check Point Software Technologies Chief Marketing Officer Julie Parrish as its first CMO, the up-and-coming cybersecurity analytics company announced Wednesday.

RedSeal: Digital Gatekeeper

RED HERRING | November 1, 2016

As our use of technology has evolved, so have the threats that can derail and even destroy a business or even a country. Remember December 2013 when credit card information from 40 million users were stolen a few days before Christmas in a major attack on Target? Or the power outage (allegedly triggered by Russia) which lasted six to nine hours in the Ukraine during Christmas season last year? Cyber attacks are more of a threat to companies and governments today than they were yesterday, and will become even more so tomorrow.

Ray Rothrock: A Venture Capitalist with a Cause

RED HERRING | November 1, 2016

Most venture capitalists embrace the career after a stint as a banker, CEO, or tech executive. Then the average tenure as a VC spans over 15 years, during which they groom two new startups per year, and enjoy the lifestyle attached to that profession. Eventually they retire, often rich, and “vanish to the sunset” as John Fisher, the founder of Draper Fisher elegantly puts it. Few would have anticipated that Ray Rothrock, would have gone the other way, and reversed from a successful quarter century role at Venrock, the famous Rockefeller venture firm, to spearhead a then fledgling start up as his last assignment in his professional journey.

Experts Share Their Cybersecurity Horror Stories

TECHREPUBLIC | October 28, 2016

The hooded hacker hunches over a clacking keyboard, face illuminated by the dim and flickering glow of a monitor. He punches a button and executes the code. He lurks in the dark. He’s a monster with the power to annihilate people, governments, and companies.

Discovering a Cure for Cyber Threats

BECKER’S HOSPITAL REVIEW | October 17, 2016

Improving security for electronic health records will enhance trust and unlock their full potential.

A friend of mine recently had a frustrating experience trying to send his medical records to a major hospital. He wanted to email them, however the hospital said no, they only accept faxed records. They said there are simply too many security risks involved with electronic records.