In order to provide you with the best experience possible we might sometimes track information about you. Sometimes this may involve writing a cookie. We use this information for things like experience enrichment, analytics and targeting advertising. We recommend allowing these functions to get the most out of your experience.
OKWe may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.
Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.
These cookies are strictly necessary to provide you with services available through our website and to use some of its features.
Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.
We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.
We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.
We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.
Google Webfont Settings:
Google Map Settings:
Google reCaptcha Settings:
Vimeo and Youtube video embeds:
Cyber Trends to Watch for in 2024: Navigating the Evolving Landscape
/by Greg EnriquezAs technology continues to advance at a rapid pace, the cyber landscape is undergoing unprecedented transformations. As we step into 2024, it’s crucial to stay ahead of the curve and be aware of emerging cyber trends.
Keep an eye on these notable trends unfolding in the cybersecurity landscape:
1. AI-Powered Cyber Attacks
Artificial Intelligence (AI) […]
Guardians of Trust: Safeguarding Customer Data
/by Shanee MaloneAs the year ends and holiday shopping hits an all-time high, the security of customer information is critical. With each item added to the cart, customers place their trust in stores, entrusting them with personal and financial details. Any breach of this trust can result in severe consequences for both the customers and the business. […]
Strengthened Cybersecurity Regulations in New York: What It Means for Businesses
/by Greg EnriquezIn an ever-evolving digital landscape, cybersecurity remains a paramount concern for both individuals and businesses alike. New York’s Department of Financial Services (DFS) has recently taken a significant step forward in addressing these concerns by issuing updated and strengthened cybersecurity regulations. These new regulations build upon the foundation laid out in 2017 and introduce several […]
Risk Prioritization: Improving Network Vulnerability Security Management
/by RedSealStaying proactive with vulnerability prioritization is essential for any organization to effectively manage and mitigate cybersecurity risks.
Here are some key steps and strategies to help you prioritize vulnerabilities proactively:
Identify assets that have not been scanned by a vulnerability management tracking tool. Identify the network devices and specific access rules preventing scanner access. […]
Independent Assessment: TAG Infosphere
/by RedSealUsing RedSeal for Cybersecurity and Compliance
A recent study by independent industry analysts at TAG Infosphere concluded that the exposure analytics capabilities of the RedSeal platform— specifically, network modeling, attack path analysis, risk prioritization, and compliance management— are well-suited to reduce risk and strengthen the security posture of complex hybrid networks.
[…]
Expert Insights: Building a World-Class OT Cybersecurity Program
/by Jane PaolucciIn an age where manufacturing companies are increasingly reliant on digital technologies and interconnected systems, the importance of robust cybersecurity programs cannot be overstated. While attending Manusec in Chicago this week, RedSeal participated on a panel of cybersecurity experts to discuss the key features, measurement of success, and proactive steps that can lead to a […]
5 Critical Steps to Identifying and Remediating Exfiltration Paths
/by Wayne Lloyd, Federal CTO, RedSealSummary. Cybersecurity risks continue to rise, further increasing the severity of long-term impacts.
The latest IBM Data Breach Report revealed 82% of breaches involved data stored in the cloud—public, private, or multiple environments, with attackers gaining access to multiple environments 39% of the time. In 2023, the average cost of a data breach reached an […]
Custom Best Practice Check for Detecting Juniper Firewall Vulnerabilities
/by Bill Burge, RedSeal Professional ServicesName: Juniper Firewall Vulnerability Detection Description: This Custom Best Practice Check (CBPC) detects potential vulnerabilities in Juniper firewalls that could lead to unauthorized access and remote code execution.
Rule: Regex: ^ *web-management \{(\r?\n) *htt.*
Explanation: This regular expression (regex) is designed to match specific configuration lines within a Juniper firewall’s configuration related to web management settings. […]
What the Rockwell Automation ThinServer Vulnerabilities Mean for Industrial Cybersecurity
/by Wayne Lloyd, Federal CTO, RedSealThe cybersecurity landscape is an ever-evolving domain with threats sprouting up constantly. The recent revelation concerning vulnerabilities in Rockwell Automation’s ThinManager ThinServer has highlighted the urgency for robust cybersecurity measures in the realm of industrial control systems (ICS).
Understanding the Rockwell Automation ThinServer Vulnerabilities
Rockwell Automation’s ThinManager ThinServer, a product designed for […]
Key Insights from Black Hat 2023: RedSeal’s Perspective
/by Greg EnriquezLast week approximately 40,000 cybersecurity professionals, researchers, and experts, met in Las Vegas for the annual Black Hat conference to discuss the latest trends, emerging threats, and groundbreaking technologies in cybersecurity. The RedSeal team engaged in all the event had to offer and left with several key takeaways into the current state of cybersecurity and […]