In order to provide you with the best experience possible we might sometimes track information about you. Sometimes this may involve writing a cookie. We use this information for things like experience enrichment, analytics and targeting advertising. We recommend allowing these functions to get the most out of your experience.
OK
Where is the new “Security Stack” hiding?
/by Chris Lucas, CISSP, CCSKThe days of the traditional security stack are numbered, brought on by the maturity of shared resource computing and the rapid migration to the public cloud due to the COVID-19 pandemic. This blog will explore a brief history of fortification, its impact on the early internet security architectures, and today’s challenges.
The Impact of the ONC Cures Act on API Security
/by Jay Miller, Vice President, Commercial SalesONC Cures Act Final Rule, apart from providing patients and their healthcare providers secure yet seamless access to health information, aims to increase innovation and trigger competition. With more competition comes innovation, as new entrants offer much wider healthcare choices and solutions for patients. While the ONC Cures Act Final Rule aims to make healthcare information exchange easy through standardized APIs, these APIs are vulnerable to cyberattacks. Find out how cloud solutions can help enhance API security.
Understanding What’s In My Cloud
/by Dr. Mike Lloyd, CTO, RedSealToday’s business applications run in an environment that would be unrecognizable to IT professionals 10 years ago. The rise of virtualization and the cloud has finally cut the ties to specific hardware, and all but the most exotic workloads can now be run anywhere — on virtual machines in your physical buildings, or on a cloud vendor of your choice.
RedSeal and Cloud Security Posture Management
/by Bryan Barney, RedSeal CEOFor more than a decade, RedSeal has been in the business of helping customers understand their on-premise networks i.e. what devices are on the network, how they are connected, and the security implications of their configuration. Our mission is to provide organizations with technology that allows them to understand their network, hybrid, and cloud security posture.
CISA and FBI Publishes List of Top Vulnerabilities Currently Targeted by Foreign Sponsored Hacking Groups
/by Bill Burge, RedSeal Professional ServicesThe Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have jointly released a report on the top 10 vulnerabilities consistently being scanned, targeted, and exploited by foreign sponsored hacking groups.
Cyber Readiness Pillars and RedSeal
/by Wayne Lloyd, Federal CTO, RedSealOrganizations need a cybersecurity strategy to protect both infrastructure and customer data from growing cybersecurity threats and RedSeal professional services are the solution to all your cybersecurity answers.
Automation, Integration and RedSeal
/by John Bays, Senior Security Solutions Consultant, FederalOrganizations can become more resilient to cyber-attacks by directing all the resources to these problem-solving activities. To streamline security teams’ efforts, and further improve network security, RedSeal now integrates into the user interfaces of several leading security products.
Five Steps to Improve your Multi-Cloud Security
/by Kurt Van Etten, Chief Product Officer, RedSealThe rapid adoption of the cloud – in most cases multiple clouds – has created a rapid increase in security issues. Follow these five steps to discover how enterprises can address their cybersecurity framework issues directly.
The Real Reason for Breaches (and How to Avoid Them)
/by Dr. Mike Lloyd, CTO, RedSealSecurity is a tough job – we invest so much effort, and yet the breaches keep on happening. The way forward is to find what you have, in the cloud and across your physical sites, see how it’s all connected, and understand where you can block incoming attacks.
Experts Warn of Attacks on a Cisco ASA Security Flaw due to a new Proof-of-Concept Exploit
/by Heidi Gerken, Senior Sales EngineerA security flaw can allow an unauthenticated attacker to remotely conduct a cross site scripting (XSS) attack against a user of the web services interface. Enterprises should patch their Cisco ASA Software and Firepower Software as soon as possible.