In order to provide you with the best experience possible we might sometimes track information about you. Sometimes this may involve writing a cookie. We use this information for things like experience enrichment, analytics and targeting advertising. We recommend allowing these functions to get the most out of your experience.
OKWe may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.
Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.
These cookies are strictly necessary to provide you with services available through our website and to use some of its features.
Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.
We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.
We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.
We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.
Google Webfont Settings:
Google Map Settings:
Google reCaptcha Settings:
Vimeo and Youtube video embeds:
Visibility of IT Assets for Your Cybersecurity Program
/by Kes JeciusBy Kes Jecius, RedSeal Senior Consulting Engineer
The Center for Internet Security’s (CIS) first control for implementing a cybersecurity program is to understand and manage the hardware assets that make up your IT infrastructure. These hardware assets consist of network devices, servers, workstations, and other computing platforms. This is a difficult goal to achieve, further […]
I See A Milestone, Not Just Another Funding Round
/by Dr. Mike Lloyd, CTO, RedSealI’m delighted with the deal RedSeal just announced with STG. I’ve worked in several start-ups — from the earliest stage, when the whole company could share a single elevator, all the way through acquisition by huge global corporations. My favorite times are when we’re all actively engaged with customers and the company has a sense […]
The Importance of Speed in Incident Response
/by Wayne Lloyd, Federal CTO, RedSealBy RedSeal Federal CTO Wayne Lloyd
Have you seen CrowdStrike’s “Global Threat Report: Adversary Tradecraft and The Importance of Speed”?
Just released at RSA Conference 2019 this year, the key takeaway is that nation states and criminal organizations are increasing both the speed and sophistication of their cyber tactics. This […]
Using the CIS Top 20 Controls to Implement Your Cybersecurity Program
/by Kes JeciusBy Kes Jecius, Senior Consulting Engineer
I have the privilege of working with security groups at many different enterprise companies. Each of them is being bombarded by many different vendors who offer security solutions. No surprise, the common estimate is that there are approximately 2,000 vendors offering different products and services to these companies.
Each […]
Cyber Protection Teams – Hands On
/by RedSealBy Aaron Gosney, RedSeal Senior Sales Engineer and Dave Lundgren, RedSeal DOD Technical Account Manager
To help Cyber Protection Teams (CPTs) understand how RedSeal helps them secure cyber terrain, we’ve developed a hands-on scenario-based workshop. We’ve held this workshop for different parts of the DOD, and, more recently for federal civilian cyber operators at CyberScoop’s […]
Using RedSeal to Fix Cracks in the Foundation
/by RedSealWritten By Nate L. Cash, RedSeal Senior Network Security Engineer
A house is only as strong as its foundation. You want to ensure that water can’t enter your foundation, or it will compromise the strength of the house. In technology that foundation is your network and hackers are the water. Like water, hackers will slowly […]
RedSeal and DHS CISO’s Current Priorities
/by Wayne Lloyd, Federal CTO, RedSealIn early August, at MeriTalk’s Cyber Security Brainstorm, Paul Beckman, chief information security officer (CISO) at the Department of Homeland Security (DHS), said that his biggest new priorities are:
Increasing use of software-defined networking (SDN) Adopting a zero-trust model Optimizing DHS’ security operations centers (SOC)
He added that the ability to leverage micro segmentation in […]
Which is more valuable – your security or a cup of coffee?
/by Dr. Mike Lloyd, CTO, RedSealThe drumbeat of media coverage of new breaches continues, but it’s useful sometimes to look back at where we’ve been. Each scary report of so many millions of records lost can be overwhelming. It certainly shows that our network defenses are weak, and that attackers are very effective. This is why digital resilience is key […]
Cyber Protection Team Workshop
/by Wayne Lloyd, Federal CTO, RedSealRecently, I was privileged to spend half a day with some of our nation’s finest cyber warriors at a RedSeal workshop. Early in the morning, members of various DoD Cyber Protection Teams (CPTs) gathered around a u-shaped table in Columbia, Maryland.
The workshop showcases how CPTs use RedSeal every day to secure cyber terrain and […]
RedSeal and DHS CDM DEFEND
/by Wayne Lloyd, Federal CTO, RedSealThis year, the big news in government cybersecurity is the DHS CDM DEFEND program and task orders being announced by various federal departments. The DHS CDM DEFEND, which stands for Continuous Diagnostics and Mitigation (CDM) Dynamic and Evolving Federal Enterprise Network Defense, task orders are awarded under the General Services Administration’s Alliant 1 Unrestricted contract. […]