Nimmy Reichenberg
Nimmy Reichenberg heads global marketing for AlgoSec and surprisingly actually understands what he markets. Originally a software engineer with security focus, Nimmy designed and developed security products before switching over to the dark side and becoming a marketeer. Nimmy has published several articles in security publications such as SC Magazine and ISSA journal and has spoken on various security topics in leading security conferences.

When he is not brainwashing you to buy AlgoSec products, Nimmy can be found Kite Surfing at the nearest beach where the wind is blowing over 15 knots, and spending time with his wife and two boys.

Back To Basics: 10 Security Best Practices

back to basics

Despite the media hype, the biggest threats to your enterprise data assets are actually from the same old threats that we were worried about last year, five years ago, and in many cases even a decade ago. Only a handful of attacks truly use sophisticated “Mission Impossible” techniques, so the shiny new tools may do more harm than good at protecting your organization. So before investing in new tools, here are 10 security best practices to help protect your organization with the techniques and technologies you likely already have in place. These best practices should be common knowledge, but unfortunately they are hardly common practice.

Survival Tips For The Security Skills Shortage


No matter how you slice it, creating a security professional with 10 years of experience takes, well, 10 years. Here are six suggestions for doing more with less.

Who Put That in Here? (And Who's Going to Take It Out)

07_390X390_icon 2

In this post we’ll cover the worst practice of “Uncoordinated Policy Management” which Gartner also nicely referred to as “firewall roach motel — rules go in, but they don’t come out“. Helping organizations improve security policy management is obviously at the heart of what we do here at AlgoSec.

Insiders – the Threat Right in Your Blind Spot


While you’re standing on the ramparts of your enterprise perimeter, scanning for bad guys, there may well be a threat right in your blind spot: Insiders. Maybe it’s someone truly malicious, like a spy. Maybe it’s someone pilfering for profit, the modern equivalent of someone stealing office supplies. Either way, the threat from trusted insiders…Read More

All War and No Play: Align Your IT Organization to Eliminate End-User Frustration


I am a big advocate of examining solutions from both a processes and a tools perspective. Although AlgoSec is a software provider, I am the first to acknowledge that a good tool will not fix a bad process. On the flip side, a good process which can’t be enforced will not go very far either. This blog post examines what you can do from a process perspective to address organizational misalignment.

Taking Care of Your Business


Welcome to the fourth blog in our special series, Mitigating Gartner’s Network Security Worst Practices. In this post we’ll cover the worst practice of “Insufficient Focus on Users and Business Requirements” which Gartner also fondly calls “That’s what our policy says”[1]. According to research, “Security projects that are owned exclusively within the security team face…Read More

Saying No to the Culture of No


In this blog we’ll cover “The Culture of No”. According to research by Gartner, “Many Gartner clients make statements along the lines of “those IT folks prevent us from doing our jobs.” They specifically cite that security departments implement policy and controls without regard for business function.” Does this sound familiar?

Mitigating Gartner’s Network Security Worst Practices


Welcome to our special blog series: Mitigating Gartner’s Network Security Worst Practices. Over the course of more than 3,000 client interactions in the past year, Gartner has observed several common network security “worst practices.” The result is this great research paper titled “Avoid These “Dirty Dozen” Network Security Worst Practices”. According to the report clients “often…Read More

Are You Guilty of the Seven Deadly Sins of Security Policy Change Management?

7 deadly sins 200

Managing ever-growing network security policies is not getting any easier. We are facing more threats, greater complexity and increased demand for both security and application connectivity. However, many companies are failing to update their approach to security policy management to keep up with these challenges. In my years of interactions with companies across pretty much…Read More

Micro-Segmentation – Do Good Things Really Come in Small Packages?


For years, organizations have focused most of their network security efforts on the perimeter. First there were firewalls, then intrusion prevention systems came along followed by web proxies, and recently advanced malware detection (AKA sandboxing) solutions. This perimeter-focused approach is often referred to as the M&M Strategy – a hard crunchy outside and soft chewy…Read More

The Tribe Has Spoken – You are Voted off the Network

Tribal knowledge

One of the more interesting phenomena I have observed when working with companies on their network security challenges is that every company feels that their challenges are unique. While this is true to some extent, there are many more similarities than differences between companies. One such similarity is the existence of “Network Ned”. Who is…Read More

Tips to Help You Bring Security Up to Speed

speed-up 1

Why is it that virtually all aspects of IT operate at near real time EXCEPT security? You can spin up a new server on demand or create a new database in a couple of minutes, but anything that has to do with the security policy can take weeks—or longer. It all goes back to a…Read More