Red Sift welcomes Kevin to its advisory board

Kevin Fielder joins the Red Sift advisory board – Photography by Fergus Burnett

I recently joined the advisory board of Red Sift.

Why I hear you ask?  Outside of the fame and untold riches…

Security is hard.  If you have a large team of experts with the appropriate budget it’s hard. And if you’re a small company with limited resources, dreaming of the day you have a large, dedicated security team, it’s extremely hard!  Remember, it’s not the size of the organization that defines how valuable a target it is, but the value of the assets to criminals, nation-states, or even unscrupulous competitors.

Similarly, if you’re passionate about helping solve security problems you may want to focus on finding amazing solutions, not building all the ancillary capabilities such as data analytics, logging, visualizations, RBAC, etc.

Red Sift is changing this.

For companies of all sizes, we’re building a scalable, reliable platform hosting security tools and capabilities that solve real problems. Most importantly they are accessible to all, comparatively easy to use, and offer exceptional value.

For developers, we are offering a scalable, reliable, and easy-to-code-for platform that takes care of all the ‘non-core’ parts of the solution, plus access to advanced capabilities such as data analytics and machine learning.

I’m hugely passionate about ‘democratizing security’ and enabling businesses to secure their systems and data with the best possible solutions. The vision the Red Sift founders have aligns extremely closely with these beliefs.

Our aim is nothing short of revolutionary;

  • Companies will have access to advanced capabilities at realistic price points
  • Developers will have access to an advanced platform providing an array of critical features ‘out of the box’

By linking these two ends of the same equation we hope to create a thriving community developing amazing security tools that really meet the needs of organisations.

Given these synergies between the Red Sift vision and my belief in how important it is to make security available to all I’m excited to be onboard, and really looking forward to contributing to the vision and direction.

With my background working in technology and security roles across companies ranging in size from 25 people to General Electric, I hope to bring some real guidance around what organisations are looking for and the problems we are all trying to solve.  Examples of this include the need for simplifying security and providing just what is required vs. a bloated feature set. The excellent OnDMARC, OnINBOX and OnDOMAIN already follow this principle.

This focus on simply meeting key requirements will help ensure that the Red Sift proposition will become the go-to platform for organizations’ technical security needs.

I’m also close to a few security startups, and am pretty confident a platform such as this would have greatly aided them during the bootstrapping process!

As the platform grows, the ability to easily aggregate the view across the different apps an organization uses will enable a one-stop view of an organization’s current security posture.

Hop on board as we build this new security community!

Find out more about Red Sift people, platform, and products at redsift.com.

PUBLISHED BY

Kevin Fielder

11 Sep. 2018

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
Certificates

Preventing certificate related violations in cybersecurity frameworks:  A guide to certificate monitoring…

Rebecca Warren

TLS is one of the most widely adopted security protocols in the world allowing for unprecedented levels of commerce across the internet.  At the core of the TLS protocol is TLS certificates. Organizations must deploy TLS certificates and corresponding private keys to their systems to provide them with unique identities that can be reliably…

Read more
ASM

Red Sift ASM & Red Sift Certificates: the missing link in your…

Billy McDiarmid

According to Gartner, Attack Surface Management (ASM) refers to the “processes, technology and managed services deployed to discover internet-facing enterprise assets and systems and associated exposures which include misconfigured public cloud services and servers.” This broad category of tooling is used within Continuous Threat Exposure Management (CTEM) programs, with many vendors within it having…

Read more
Email

The best tools to protect yourself from SubdoMailing

Francesca Rünger-Field

In late February 2024, ‘SubdoMailing’ became a trending search term overnight. Research by Guardio Labs uncovered a massive-scale phishing campaign that had been going on since at least 2022. At the time of reporting, the campaign had sent 5 million emails a day from more than 8,000 compromised domains and 13,000 subdomains with several…

Read more
Product Release

Red Sift’s Spring 2024 Quarterly Product Release

Francesca Rünger-Field

This early into 2024, the cybersecurity space is already buzzing with activity. Emerging standards, such as Google and Yahoo’s bulk sender requirements, mark a new era of compliance for businesses reliant on email communication. At the same time, the prevalence of sophisticated cyber threats, such as the SubdoMailing campaign, emphasizes the continual hurdles posed…

Read more