In order to provide you with the best experience possible we might sometimes track information about you. Sometimes this may involve writing a cookie. We use this information for things like experience enrichment, analytics and targeting advertising. We recommend allowing these functions to get the most out of your experience.
OK
Navigating the Authorization to Operate Process with RedSeal
/by RedSealThe Authorization to Operate (ATO) is a critical component in the security architecture of the DoD and IC, ensuring that systems operate with a recognized and accepted level of risk. This process underscores the rigorous standards that these systems must meet to safeguard national security effectively. RedSeal can significantly assist system owners, Information System […]
Cyber News Roundup for May 17, 2024
/by Wayne Lloyd, Federal CTO, RedSealWelcome to our latest cybersecurity roundup. This week, we explore critical lessons from NERC’s GridEx VII exercise, the surge in Chinese-manufactured devices in US networks, increased OT attacks by Russia’s Sandworm group, a data breach disclosure by Dell, a gift card fraud warning from the FBI, and how solar storms impacted Midwest corn planting. We’ve […]
Navigating DoD’s Cybersecurity Maturity Model Certification
/by RedSealThe Cybersecurity Maturity Model Certification (CMMC) remains pivotal for defense contractors and entities handling Controlled Unclassified Information (CUI). A third-party assessment across five levels ensures enterprises security maturity, which is vital for safeguarding national interests. CMMC builds upon NIST SP 800-171 compliance, with 110 security controls established by SP 800-171 extending its scope and rigor.
[…]
Cyber News Roundup for May 9, 2024
/by Wayne Lloyd, Federal CTO, RedSealCuckoo malware, a paralyzed city of Wichita, and early cybersecurity preparations for the upcoming Olympics made headlines this week. RedSeal is here to keep you informed and equipped to fortify your cyber defenses in an ever-evolving digital landscape.
1. Cuckoo malware targets macOS systems
Cybersecurity researchers at Kandji have identified a new malware called […]
Cyber News Roundup for May 2, 2024
/by Wayne Lloyd, Federal CTO, RedSealFrom sophisticated cyberattacks crippling essential infrastructure to stealthy botnet discoveries and revelations about data breaches, this week’s roundup has something for all. Join us as we delve into the latest stories surrounding cyber warfare, emerging threats, and innovative defense strategies.
RedSeal is here to keep you informed and equipped to fortify your cyber defenses in […]
Cyber News Roundup for April 26, 2024
/by Wayne Lloyd, Federal CTO, RedSealWelcome to our Cyber News Roundup, your go-to source for staying informed about the ever-evolving world of cybersecurity. Staying ahead of the curve is more crucial than ever as cyber threats continue to evolve and adapt at an unprecedented pace.
Each week, we’ll share a curated selection of top stories from around the globe. Whether […]
From Reactive to Proactive: Transforming Healthcare Cybersecurity Post-Change Healthcare Attack
/by Jane PaolucciChange Healthcare, a major player in the healthcare technology sector, fell victim to a ransomware attack in February and is quickly heading towards a billion dollars in loss. The breach disrupted its operations and potentially compromised sensitive patient data. The attackers, ALPHV, also known as BlackCat and Noberus, exploited vulnerabilities in the company’s IT infrastructure, […]
Tales from the Trenches: “Is that what you’re going to say to the auditor?”
/by Brad Schwab, Senior Security Solutions ConsultantToday’s tale from the trench is brought to you by Brad Schwab, Senior Security Solutions Consultant.
In the high-stakes world of security operations, one question looms larger than most: Are you sure you’re scanning the entire network? It seems straightforward, but for any team dealing with a network of significant scale, answering this question can […]
The Critical Role of Network Security in Zero Trust
/by Wayne Lloyd, Federal CTO, RedSealThe National Security Agency’s (NSA) Cybersecurity Information Sheet (CIS) entitled “Advancing Zero Trust Maturity Throughout the Network and Environment Pillar” outlines how organizations can enhance their network security within the Zero Trust model. This involves leveraging advanced cybersecurity strategies to mitigate risks of lateral movement by malicious actors within networks.
In a recent […]
Tales from the Trenches: Network Backdoors — Lions, and Tigers, and Bears…
/by Brad Schwab, Senior Security Solutions ConsultantToday’s tale from the trench is brought to you by Brad Schwab, Senior Security Solutions Consultant.
One of the greatest concerns for professionals in Network and Security Operations is the potential existence of a backdoor in their network—let alone the presence of numerous backdoors! Identifying backdoors can be a daunting challenge, as they might exist […]