In order to provide you with the best experience possible we might sometimes track information about you. Sometimes this may involve writing a cookie. We use this information for things like experience enrichment, analytics and targeting advertising. We recommend allowing these functions to get the most out of your experience.
OK
Embracing Continuous Threat Exposure Management (CTEM)
/by RedSealWith new vulnerabilities emerging daily and cyber threats becoming more sophisticated, organizations must evolve their cybersecurity strategies to protect their digital assets. One such strategy endorsed by a leading industry analyst firm is gaining traction with forward-thinking CISOs: Continuous Threat Exposure Management (CTEM). In this blog, we’ll explore the basics of CTEM, its benefits, and how […]
Understanding the UnitedHealthcare Data Breach: The Importance of Good Segmentation
/by Dr. Mike Lloyd, CTO, RedSealAfter receiving a call from KCBS to comment on the UnitedHealthcare data breach, I was reminded of the critical importance of cybersecurity measures and proactive solutions like RedSeal in safeguarding sensitive information.
The Impact on Patients and Healthcare Organizations
The repercussions of the UnitedHealthcare data breach extend beyond the confines of the company itself. Patients […]
Tales from the Trenches: When Low-Risk is Actually High-Concern
/by Chris Morgan, Client Engagement DirectorSince 2004, RedSeal has been instrumental in empowering our clients to comprehensively visualize and fortify their intricate networks. While our customers initially grasped the importance of understanding their network architecture, connections, and identifying potential risks, there’s often an enlightening “aha” moment when the true significance becomes unmistakable. These narratives, cherished within the confines of RedSeal, […]
Tales from the Trenches: My network hasn’t changed!
/by John Bays, Senior Security Solutions Consultant, FederalSince 2004, RedSeal has been instrumental in empowering our clients to comprehensively visualize and fortify their intricate networks. While our customers initially grasped the importance of understanding their network architecture, connections, and identifying potential risks, there’s often an enlightening “aha” moment when the true significance becomes unmistakable. These narratives, cherished within the confines of RedSeal, […]
Keeping an Eye on IPv6 in Your Hybrid Network
/by RedSealIPv6 has its advantages
With the proliferation of connected devices, organizations everywhere are making the transition to Internet Protocol version 6 (IPv6). Beyond having astronomically more usable addresses than its IPv4 predecessor (2128 vs. 232), IPv6 has several other advantages, including:
Easier administration: IPv6 simplifies address configuration through Stateless Address Autoconfiguration (SLAAC) and DHCPv6 (Dynamic Host […]
Strengthening the Fortress: Best Practices for Incident Response
/by RedSealAs the digital age continues to see rapid change, cyber threat looms over businesses, organizations, and individuals even more than before. And, as technology advances, so do the capabilities of cybercriminals. With today’s digital environment, more than ever before, crafting a robust cybersecurity incident response plan isn’t a recommendation—it’s a critical necessity.
What does this […]
Cyber Trends to Watch for in 2024: Navigating the Evolving Landscape
/by Greg EnriquezAs technology continues to advance at a rapid pace, the cyber landscape is undergoing unprecedented transformations. As we step into 2024, it’s crucial to stay ahead of the curve and be aware of emerging cyber trends.
Keep an eye on these notable trends unfolding in the cybersecurity landscape:
1. AI-Powered Cyber Attacks
Artificial Intelligence (AI) […]
Guardians of Trust: Safeguarding Customer Data
/by Shanee MaloneAs the year ends and holiday shopping hits an all-time high, the security of customer information is critical. With each item added to the cart, customers place their trust in stores, entrusting them with personal and financial details. Any breach of this trust can result in severe consequences for both the customers and the business. […]
Strengthened Cybersecurity Regulations in New York: What It Means for Businesses
/by Greg EnriquezIn an ever-evolving digital landscape, cybersecurity remains a paramount concern for both individuals and businesses alike. New York’s Department of Financial Services (DFS) has recently taken a significant step forward in addressing these concerns by issuing updated and strengthened cybersecurity regulations. These new regulations build upon the foundation laid out in 2017 and introduce several […]
Risk Prioritization: Improving Network Vulnerability Security Management
/by RedSealStaying proactive with vulnerability prioritization is essential for any organization to effectively manage and mitigate cybersecurity risks.
Here are some key steps and strategies to help you prioritize vulnerabilities proactively:
Identify assets that have not been scanned by a vulnerability management tracking tool. Identify the network devices and specific access rules preventing scanner access. […]