<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1626328370711236&amp;ev=PageView&amp;noscript=1">
banner-blog.jpg

blog

Isolation: really making it 'FIN' for FIN7

Posted by Jay Kelley on Apr 10, 2018

It was reported on April 1st – appropriate that it was April Fool’s Day – by a number of media outlets that Hudson’s Bay Company, the Canada-based parent company of iconic luxury retailer Saks Fifth Avenue, as well as Lord & Taylor and Saks Off 5th, had been hacked. Reportedly, over 5 million credit and debit card numbers of customers of the retailers had been stolen, and supposedly were for sale on the Dark Web.

Read More

Tags: hacked, hackers, phishing attack, cyber security, isolation technology, browser isolation

Don’t Be a Wildebeest

Posted by Kowsik Guruswamy on Mar 29, 2018

 On the Serengeti, wildebeest have survived for millennia by using a simple strategy: safety in numbers. It’s great for the species, but each animal can only hope that another one will take one for the team.  

 

Read More

Tags: browser-based attacks, remote browsers, cyberattacks, isolation platform, trust, "risky web", safe web

Love and malware

Posted by Jay Kelley on Feb 14, 2018

 

 

“Love is like a virus. It can happen to anybody at any time.” – Maya Angelou

 

It’s Valentine’s Day, and love is in the air.

 

Unfortunately, so are emails riddled with malware.

Read More

Tags: malware, cyber security, isolation technology, isolation platform, virus

 A New Approach to End Typosquatting

Posted by Jay Kelley on Feb 13, 2018

 

 “Simplicity is the ultimate sophistication.” – Leonardo da Vinci

 

This quote even holds true when it comes to cyber threats.

 

While experts discuss the impending battle royal between cybersecurity, and attackers and hackers, focusing in on “good AI” vs. “evil AI” in an ever-escalating, highly-sophisticated cyber arms race, it’s sometimes the simplest of threats – and mistakes – that can be the most dangerous and frustrating.

Read More

Tags: cyber security, isolation technology, typosquatting

Isolating Meltdown & Spectre

Posted by Jason Steer on Jan 9, 2018

2018 has barely started and we've already got our first big major security vulnerabilities of the year, with the media generating lots of deserved attention worldwide on them. In case you missed the news, two major CPU vulnerabilities have been disclosed by Google and several other researchers: Meltdown and Spectre

Read More

Tags: browser-based attacks, remote browsers, web-based vulnerabilities, isolation technology

10 Reasons Why You Shouldn't Consider Isolation

Posted by Jay Kelley on Dec 7, 2017

 

While this post is intended to be a little tongue-in-cheek for readers, it’s been written to provoke discussion on how organizations continue to do the same things they have done for the last 15 years, without thinking of all the issues they bring with them…

Read More

Tags: phishing, isolation, ransomware, spear-phishing, web isolation, malvertising

Lights, Camera, Cyber Attack!

Posted by Jay Kelley on Dec 5, 2017

 

The past few years, the major studios and production companies that create movies, broadcast television, streaming content, and even online and video games have been under cyber attack.

Read More

Tags: malware, isolation, ransomware, malicious code, cyber attacks, phishing attack

Cyber Monday: Going Phishing?

Posted by Jay Kelley on Nov 21, 2017

 

The holiday shopping season kicks off this week with Black Friday (November 24 th) and Cyber Monday (November 27 th). And, if it’s any indication of how much online shopping will occur, last year (2016), Cyber Monday set a new sales record of $3.45 billion USD!
Read More

Tags: malware, phishing, isolation, cyber attacks, isolation platform, cyber Monday, Black Friday

For Feds, DMARC is a Start, But More is Needed

Posted by Jay Kelley on Nov 9, 2017

 

Last month, the U.S. Department of Homeland Security directed federal agencies to begin employing enhanced security methods and protocols on all government email accounts. This action is an effort to halt the impersonation of U.S. government email domains, referred to as spoofing, by attackers intent on deploying a dizzying array of cyber attacks typically initiated by a phishing campaign. Given that many reports place the start of a cyber attack squarely on phishing campaigns—some reports place the figure at over 90% of cyberattacks are as the result of phishing—it makes sense that the DHS would require greater email security for federal government email accounts and inboxes.

Read More

Tags: isolation, cyber attacks, phishing attack, cyber security, DMARC

The SWIFT Security Controls Framework and Isolation

Posted by Jay Kelley on Nov 7, 2017

If you are in the financial services community, you are likely well-aware of and well-acquainted with SWIFT and the services it performs. As a quick primer for the uninitiated, SWIFT is an acronym for the Society for Worldwide Interbank Financial Telecommunication, a cooperative built over forty years ago by banks and financial institutions globally to address a mutual problem: A better, more secure, and automated way to communicate inter-bank payments across borders. SWIFT addressed this common issue, and today, it is a world-leading provider of secure messaging services for over 11,000 banks, financial organizations, and enterprises in over 200 countries.

Read More

Tags: malware, phishing, spear-phishing, cyber attacks, isolation technology, isolation platform, SWIFT

Connect with us

Lists by Topic

see all

Recent Posts