Nimmy Reichenberg
Nimmy Reichenberg heads global marketing for AlgoSec and surprisingly actually understands what he markets. Originally a software engineer with security focus, Nimmy designed and developed security products before switching over to the dark side and becoming a marketeer. Nimmy has published several articles in security publications such as SC Magazine and ISSA journal and has spoken on various security topics in leading security conferences.

When he is not brainwashing you to buy AlgoSec products, Nimmy can be found Kite Surfing at the nearest beach where the wind is blowing over 15 knots, and spending time with his wife and two boys.

Reaching for Cloud Nine: Tips to Help You Prepare to Launch Business Applications to the Cloud

reaching for cloud

reaching for cloudAccording to a recent survey, two thirds of organizations are currently deploying or planning to deploy business applications on a public cloud infrastructure. If your organization is among them consider this: two-thirds of the organizations we surveyed are struggling to figure out how to extend their security policy across the hybrid environment. It a little daunting, right?

Read more on Reaching for Cloud Nine: Tips to Help You Prepare to Launch Business Applications to the Cloud…

Look Before You Leap: Tips to Help You Manage Your Security Policy Across a Hybrid Cloud Environment

giantleap

giantleapThis situation may sound familiar – your CEO, CIO, or another executive outside of the security organization summons you to a meeting. “We have decided to move [Enter unreasonable number here] of our business applications to the public cloud by [Enter impossible timeframe here] he announces. “And don’t tell us that security is an issue in the cloud – [Enter name of high-profile competitor here] has already saved millions of dollars by moving to the cloud – so do what you need to do make sure we are secure”.

Read more on Look Before You Leap: Tips to Help You Manage Your Security Policy Across a Hybrid Cloud Environment…

Bashing Bash with Network Segmentation

HiRes

HiResIn September, a critical bug in the open source Bourne-Again Shell (BASH) that’s ubiquitous in Unix-based systems, including Linux and Mac OS X, displaced Heartbleed as the top network security threat. Called Shellshock, the bug allows hackers to insert code into the shell and hijack an operating system through the internet. From there, they can access sensitive information—unless a strong defense is in place.

Read more on Bashing Bash with Network Segmentation…

Where Were You Born?

brucespringsteenpicture-jpg

brucespringsteenpicture-jpgExciting news from AlgoSec this week: we announced our solution for unified security policy management across hybrid cloud infrastructure. This is a key component of our “managing security at the speed of business” vision and supports our mission to automate security policy management in evolving data centers and networks.

Read more on Where Were You Born?…

A Sneak Preview of Our Network Segmentation Webinar next Week

businessman over stretched

businessman over stretchedI am psyched to have Mark Wolfgang, expert penetration tester from ShoreBreakSecurity join us for our webinar on network segmentation next Tuesday.

Mark will share really cool information from his pen tests – including how he was able to gain control to the entire facility of major metropolitan by exploiting a single server. How is this possible? Well, as Mark will share – once an attacker gets control of a PC he or she are really in the dark – and one of the first things an attacker does is run a scan of all endpoints which are accessible from the compromised machine to see what is around. In Mark’s words, nothing is more frustrating to an attacker than realizing he can’t really get anywhere because of effective network segmentation.

Read more on A Sneak Preview of Our Network Segmentation Webinar next Week…

The Neglect of Security Basics

basic

basicLast week we held a webinar with our good friends from Qualys (you can view the recording here). The webinar discussed the integration between Qualys and AlgoSec that enables Application-Centric Vulnerability Management. One of the questions from the audience asked what happened to device hardening? Why is everyone only talking about things such as advanced threat prevention when it comes to security practices.

Read more on The Neglect of Security Basics…