Nimmy Reichenberg
Nimmy Reichenberg heads global marketing for AlgoSec and surprisingly actually understands what he markets. Originally a software engineer with security focus, Nimmy designed and developed security products before switching over to the dark side and becoming a marketeer. Nimmy has published several articles in security publications such as SC Magazine and ISSA journal and has spoken on various security topics in leading security conferences.

When he is not brainwashing you to buy AlgoSec products, Nimmy can be found Kite Surfing at the nearest beach where the wind is blowing over 15 knots, and spending time with his wife and two boys.

The Tribe Has Spoken – You are Voted off the Network

Tribal knowledge

Tribal knowledgeOne of the more interesting phenomena I have observed when working with companies on their network security challenges is that every company feels that their challenges are unique. While this is true to some extent, there are many more similarities than differences between companies. One such similarity is the existence of “Network Ned”.

Read more on The Tribe Has Spoken – You are Voted off the Network…

Tips to Help You Bring Security Up to Speed

speed-up 1

speed-up2Why is it that virtually all aspects of IT operate at near real time EXCEPT security? You can spin up a new server on demand or create a new database in a couple of minutes, but anything that has to do with the security policy can take weeks—or longer.

Read more on Tips to Help You Bring Security Up to Speed…

Reaching for Cloud Nine: Tips to Help You Prepare to Launch Business Applications to the Cloud

reaching for cloud

reaching for cloudAccording to a recent survey, two thirds of organizations are currently deploying or planning to deploy business applications on a public cloud infrastructure. If your organization is among them consider this: two-thirds of the organizations we surveyed are struggling to figure out how to extend their security policy across the hybrid environment. It a little daunting, right?

Read more on Reaching for Cloud Nine: Tips to Help You Prepare to Launch Business Applications to the Cloud…

Look Before You Leap: Tips to Help You Manage Your Security Policy Across a Hybrid Cloud Environment

giantleap

giantleapThis situation may sound familiar – your CEO, CIO, or another executive outside of the security organization summons you to a meeting. “We have decided to move [Enter unreasonable number here] of our business applications to the public cloud by [Enter impossible timeframe here] he announces. “And don’t tell us that security is an issue in the cloud – [Enter name of high-profile competitor here] has already saved millions of dollars by moving to the cloud – so do what you need to do make sure we are secure”.

Read more on Look Before You Leap: Tips to Help You Manage Your Security Policy Across a Hybrid Cloud Environment…

Bashing Bash with Network Segmentation

HiRes

HiResIn September, a critical bug in the open source Bourne-Again Shell (BASH) that’s ubiquitous in Unix-based systems, including Linux and Mac OS X, displaced Heartbleed as the top network security threat. Called Shellshock, the bug allows hackers to insert code into the shell and hijack an operating system through the internet. From there, they can access sensitive information—unless a strong defense is in place.

Read more on Bashing Bash with Network Segmentation…

Where Were You Born?

brucespringsteenpicture-jpg

brucespringsteenpicture-jpgExciting news from AlgoSec this week: we announced our solution for unified security policy management across hybrid cloud infrastructure. This is a key component of our “managing security at the speed of business” vision and supports our mission to automate security policy management in evolving data centers and networks.

Read more on Where Were You Born?…