Nimmy Reichenberg
Nimmy Reichenberg heads global marketing for AlgoSec and surprisingly actually understands what he markets. Originally a software engineer with security focus, Nimmy designed and developed security products before switching over to the dark side and becoming a marketeer. Nimmy has published several articles in security publications such as SC Magazine and ISSA journal and has spoken on various security topics in leading security conferences.

When he is not brainwashing you to buy AlgoSec products, Nimmy can be found Kite Surfing at the nearest beach where the wind is blowing over 15 knots, and spending time with his wife and two boys.

Tips to Help You Bring Security Up to Speed

speed-up 1

speed-up2Why is it that virtually all aspects of IT operate at near real time EXCEPT security? You can spin up a new server on demand or create a new database in a couple of minutes, but anything that has to do with the security policy can take weeks—or longer.

Read more on Tips to Help You Bring Security Up to Speed…

Reaching for Cloud Nine: Tips to Help You Prepare to Launch Business Applications to the Cloud

reaching for cloud

reaching for cloudAccording to a recent survey, two thirds of organizations are currently deploying or planning to deploy business applications on a public cloud infrastructure. If your organization is among them consider this: two-thirds of the organizations we surveyed are struggling to figure out how to extend their security policy across the hybrid environment. It a little daunting, right?

Read more on Reaching for Cloud Nine: Tips to Help You Prepare to Launch Business Applications to the Cloud…

Look Before You Leap: Tips to Help You Manage Your Security Policy Across a Hybrid Cloud Environment

giantleap

giantleapThis situation may sound familiar – your CEO, CIO, or another executive outside of the security organization summons you to a meeting. “We have decided to move [Enter unreasonable number here] of our business applications to the public cloud by [Enter impossible timeframe here] he announces. “And don’t tell us that security is an issue in the cloud – [Enter name of high-profile competitor here] has already saved millions of dollars by moving to the cloud – so do what you need to do make sure we are secure”.

Read more on Look Before You Leap: Tips to Help You Manage Your Security Policy Across a Hybrid Cloud Environment…

Bashing Bash with Network Segmentation

HiRes

HiResIn September, a critical bug in the open source Bourne-Again Shell (BASH) that’s ubiquitous in Unix-based systems, including Linux and Mac OS X, displaced Heartbleed as the top network security threat. Called Shellshock, the bug allows hackers to insert code into the shell and hijack an operating system through the internet. From there, they can access sensitive information—unless a strong defense is in place.

Read more on Bashing Bash with Network Segmentation…

Where Were You Born?

brucespringsteenpicture-jpg

brucespringsteenpicture-jpgExciting news from AlgoSec this week: we announced our solution for unified security policy management across hybrid cloud infrastructure. This is a key component of our “managing security at the speed of business” vision and supports our mission to automate security policy management in evolving data centers and networks.

Read more on Where Were You Born?…

A Sneak Preview of Our Network Segmentation Webinar next Week

businessman over stretched

businessman over stretchedI am psyched to have Mark Wolfgang, expert penetration tester from ShoreBreakSecurity join us for our webinar on network segmentation next Tuesday.

Mark will share really cool information from his pen tests – including how he was able to gain control to the entire facility of major metropolitan by exploiting a single server. How is this possible? Well, as Mark will share – once an attacker gets control of a PC he or she are really in the dark – and one of the first things an attacker does is run a scan of all endpoints which are accessible from the compromised machine to see what is around. In Mark’s words, nothing is more frustrating to an attacker than realizing he can’t really get anywhere because of effective network segmentation.

Read more on A Sneak Preview of Our Network Segmentation Webinar next Week…