In order to provide with the best experience possible we might sometimes track information about you. Sometimes this may involve writing a cookie. We use this information for things like experience enrichment, analytics and targeting advertising. We recommend allowing these functions to get the most out of your experience.
OKWe may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.
Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.
These cookies are strictly necessary to provide you with services available through our website and to use some of its features.
Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.
We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.
We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.
We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.
Google Webfont Settings:
Google Map Settings:
Google reCaptcha Settings:
Vimeo and Youtube video embeds:
Tales from the Trenches: Network Backdoors — Lions, and Tigers, and Bears…
/by Brad Schwab, Senior Security Solutions ConsultantToday’s tale from the trench is brought to you by Brad Schwab, Senior Security Solutions Consultant.
One of the greatest concerns for professionals in Network and Security Operations is the potential existence of a backdoor in their network—let alone the presence of numerous backdoors! Identifying backdoors can be a daunting challenge, as they might exist […]
Understanding the UnitedHealthcare Data Breach: The Importance of Good Segmentation
/by Dr. Mike Lloyd, CTO, RedSealAfter receiving a call from KCBS to comment on the UnitedHealthcare data breach, I was reminded of the critical importance of cybersecurity measures and proactive solutions like RedSeal in safeguarding sensitive information.
The Impact on Patients and Healthcare Organizations
The repercussions of the UnitedHealthcare data breach extend beyond the confines of the company itself. Patients […]
Tales from the Trenches: When Low-Risk is Actually High-Concern
/by Chris Morgan, Client Engagement DirectorSince 2004, RedSeal has been instrumental in empowering our clients to comprehensively visualize and fortify their intricate networks. While our customers initially grasped the importance of understanding their network architecture, connections, and identifying potential risks, there’s often an enlightening “aha” moment when the true significance becomes unmistakable. These narratives, cherished within the confines of RedSeal, […]
Tales from the Trenches: My network hasn’t changed!
/by John Bays, Senior Security Solutions Consultant, FederalSince 2004, RedSeal has been instrumental in empowering our clients to comprehensively visualize and fortify their intricate networks. While our customers initially grasped the importance of understanding their network architecture, connections, and identifying potential risks, there’s often an enlightening “aha” moment when the true significance becomes unmistakable. These narratives, cherished within the confines of RedSeal, […]
Keeping an Eye on IPv6 in Your Hybrid Network
/by RedSealIPv6 has its advantages
With the proliferation of connected devices, organizations everywhere are making the transition to Internet Protocol version 6 (IPv6). Beyond having astronomically more usable addresses than its IPv4 predecessor (2128 vs. 232), IPv6 has several other advantages, including:
Easier administration: IPv6 simplifies address configuration through Stateless Address Autoconfiguration (SLAAC) and DHCPv6 (Dynamic Host […]
Strengthening the Fortress: Best Practices for Incident Response
/by RedSealAs the digital age continues to see rapid change, cyber threat looms over businesses, organizations, and individuals even more than before. And, as technology advances, so do the capabilities of cybercriminals. With today’s digital environment, more than ever before, crafting a robust cybersecurity incident response plan isn’t a recommendation—it’s a critical necessity.
What does this […]
Cyber Trends to Watch for in 2024: Navigating the Evolving Landscape
/by Greg EnriquezAs technology continues to advance at a rapid pace, the cyber landscape is undergoing unprecedented transformations. As we step into 2024, it’s crucial to stay ahead of the curve and be aware of emerging cyber trends.
Keep an eye on these notable trends unfolding in the cybersecurity landscape:
1. AI-Powered Cyber Attacks
Artificial Intelligence (AI) […]
Guardians of Trust: Safeguarding Customer Data
/by Shanee MaloneAs the year ends and holiday shopping hits an all-time high, the security of customer information is critical. With each item added to the cart, customers place their trust in stores, entrusting them with personal and financial details. Any breach of this trust can result in severe consequences for both the customers and the business. […]
Strengthened Cybersecurity Regulations in New York: What It Means for Businesses
/by Greg EnriquezIn an ever-evolving digital landscape, cybersecurity remains a paramount concern for both individuals and businesses alike. New York’s Department of Financial Services (DFS) has recently taken a significant step forward in addressing these concerns by issuing updated and strengthened cybersecurity regulations. These new regulations build upon the foundation laid out in 2017 and introduce several […]
Risk Prioritization: Improving Network Vulnerability Security Management
/by RedSealStaying proactive with vulnerability prioritization is essential for any organization to effectively manage and mitigate cybersecurity risks.
Here are some key steps and strategies to help you prioritize vulnerabilities proactively:
Identify assets that have not been scanned by a vulnerability management tracking tool. Identify the network devices and specific access rules preventing scanner access. […]