In order to provide you with the best experience possible we might sometimes track information about you. Sometimes this may involve writing a cookie. We use this information for things like experience enrichment, analytics and targeting advertising. We recommend allowing these functions to get the most out of your experience.
OKWe may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.
Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.
These cookies are strictly necessary to provide you with services available through our website and to use some of its features.
Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.
We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.
We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.
We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.
Google Webfont Settings:
Google Map Settings:
Google reCaptcha Settings:
Vimeo and Youtube video embeds:
Cybersecurity: The Hackers Are Already Through The Utilities’ Doors, So What’s Next?
/by RedSealForbes | December 20, 2018
In a recent conversation on the topic of cybersecurity, Ray Rothrock – CEO of cybersecurity firm RedSeal, and author of the 2018 book Digital Resilience – offered some interesting and sobering insights on the state of the cyber world and utilities. He commented that hackers are already likely sitting in various U.S. utility systems and reconnoitering, in what the Department of Homeland Security calls an Advanced Persistent Threat mode. The critical question, then, is what to do about that fact, and how to create resilient responses.
Zuckerberg: How He Can Get Facebook Back On Track
/by RedSealForbes | December 15, 2018
“Facebook rose to success at a time when most people made clear how little they cared about privacy – we would post anything, and we enjoyed the freedom and the sense of connection,” said Dr. Mike Lloyd, who is the CTO of RedSeal. “Unfortunately, like a vine growing up a building, Facebook has spent years attaching itself to the way people used to behave. Its business model depends on people remaining incautious, and insensitive to privacy issues. But people are changing as we encounter more of the downsides of social networks. We are getting more suspicious and less trusting.”
Best security software: How 25 cutting-edge tools tackle today’s threats
/by RedSealIDG | December 14, 2018
Threats are constantly evolving and, just like everything else, tend to follow certain trends. Whenever a new type of threat is especially successful or profitable, many others of the same type will inevitably follow. The best defenses need to mirror those trends so users get the most robust protection against the newest wave of threats. Along those lines, Gartner has identified the most important categories in cybersecurity technology for the immediate future.
Trade group pushes voluntary cybersecurity standard for defense contractors
/by RedSealThe Washington Post | December 13, 2018
With Kimberly Baker, RedSeal Senior Vice President and GM Public Sector
As the U.S. military tries to ensure its military assets are as secure as possible against cyberattack, the U.S. defense industry is gathering behind a new set of standards to spot cybersecurity laggards within its own supply chain.
The Aerospace Industries Association (AIA), an Arlington-based trade association that lobbies on behalf of defense contractors, on Tuesday released a set of voluntary standards designed to help U.S. aerospace companies ensure the weapons systems they make for the U.S. military are secure from hackers.
Does Improving Cybersecurity Begin with Improving the Acquisitions Process?
/by RedSealGovernment Technology Insider | December 11, 2018
With Kimberly Baker, RedSeal Senior Vice President and GM Public Sector
The ability to secure federal data, networks, and assets is impacted by the ability of agency cyber leaders to access required technology. They need to continually respond to well-resourced adversaries that are constantly evolving the mechanisms of attack.
Because of the acquisitions process, requests to upgrade existing cyber defenses or acquire the tools that can keep pace with this constantly evolving threat environment can take months if not years. During that time – from request to approval and deployment – critical systems and data are vulnerable to a breach.
Scanning for Flaws, Scoring for Security
/by RedSealKrebs on Security | December 2018
“You can, of course, establish some important things about the quality of a building from a photograph, but it’s no substitute for really being able to inspect it from the inside,” Dr. Mike Lloyd told Dark Reading regarding the Chamber/FICO announcement in October.
7 Common Breach Disclosure Mistakes
/by RedSealDark Reading | December 7, 2018
When a breach happens, speed and clarity are vital, adds Mike Lloyd, CTO at RedSeal. Organizations that have fared badly after a breach have always been the entities that mishandled the disclosure, took too long to disclose, miscommunicated the details, or tried to cover up the issues, he says.
“There is always a surprise factor when you realize someone has broken in, but the better you know your own organization, the faster you can respond,” Lloyd says.
Building a Cyber Resilience Plan: Insights and Tactics
/by RedSealGovernment Technology Insider | November 14, 2018
With Dr. Mike Lloyd, RedSeal CTO
In part one of our discussion with Dr. Mike Lloyd of RedSeal, he shared the steps that form the basis of a cyber resilience plan so that agencies can take to limit – and recover from – the impact of a cyberattack. Continuing the discussion, Lloyd drills deeper into steps any organization can take to become more resilient.
Bouncing Back After a Breach: A Q&A with Dr. Mike Lloyd of RedSeal
/by RedSealGovernment Technology Insider | November 13, 2018
With Dr. Mike Lloyd, RedSeal CTO
While preventing a cyberattack is often the sole focus of many security strategies, the reality is, your organization is likely to suffer a breach or other disruption to network operations. How you prepare for an inevitable break-in can make all the difference. The answer lies in cyber resilience.
That’s the key message from Dr. Mike Lloyd, Chief Technology Officer for RedSeal. Lloyd says that organizations who believe they have fully protected themselves from cyber threats are missing the point. Instead, planning and preparing for “what can possibly go wrong” can help prevent the worst and get you back up and running faster and with much less impact to your operations and your users.
Cyber resilience: not just bouncing back, but a strategy for effective cyber defense
/by RedSealGovernment Technology Insider | November 8, 2018
With Dr. Mike Lloyd, RedSeal CTO
Most discussions on cybersecurity focus on prevention, but not cyber defense. But, the unfortunate reality is, some attacks will be successful no matter how well you’ve protected your networks. The question then becomes, just how quickly can you get back online and back to business?
For the Government Technology Insider podcast, we asked Dr. Mike Lloyd, Chief Technology Officer for RedSeal about how to achieve “digital resilience” – the ability to prepare for and recover from a cyber attack.