banner-blog.jpg

BLOG

James Locus

Recent Posts

Phishing Attacks Are Scarily Easy to Build

Posted by James Locus on Sep 22, 2020

Targeting People, Not the Infrastructure

Historically, many cyberattacks tended to be technology-focused and required specialized knowledge to expertly fool a network into believing the attacker was an authorized user. Spoofing, man-in-the-middle (LAN or Wi-Fi), DNS, and other attacks require actual skill (and a bit of malice) to properly execute.

Read More

Tags: phishing, isolation, email isolation, link isolation, link wrapping

How Should Zero Trust Apply to Phishing?

Posted by James Locus on Sep 3, 2020

Isolation for Zero Trust Phishing Protection

Phishing sites frequently evade web and email filters because of the inability of secure gateways to detect new phishing websites or categorize them properly. According to Menlo Labs, web and email gateways wrongly categorize 10-15 percent of malicious websites as safe.

Read More

Tags: phishing, isolation, URL, email filtering, zero trust

How Isolation Changes Incident Response

Posted by James Locus on Aug 20, 2020

Large Groups of Isolated Users Shrink Your Exposure Surface

Enterprises frequently acquire an isolation solution (with Menlo for remote browser isolation) for groups of users, such as VIPs, rather than their entire workforce. While this strategy insulates VIPs from malware attacks, it assumes that only VIPs have access to potentially crippling information.

Read More

Tags: phishing, isolation, Incident Response, API, logging

The URL “Danger Zone”

Posted by James Locus on Aug 18, 2020

Inadequate Security Policies with Uncategorized Sites

The challenge most email gateways face is how to protect against URL-based threats that exist within a “danger zone”— the period when phishing sites are allowed to sneak into the network as uncategorized sites.

 

Read More

Tags: phishing, email isolation, uncategorized sites, URL, email filtering, danger

Menlo Security Prevents Zero-Day Threat on Internet Explorer

Posted by James Locus on Aug 12, 2020

The Still-Active Zero-Day Exploit Threatens the Frequently Vulnerable JavaScript Engine

Customers of Menlo Security using Internet Explorer (IE) are protected against a recent and still-active zero-day exploit using Internet Explorer, as outlined by Microsoft’s security update CVE-2020-1380.

Read More

Tags: malware, isolaton, Internet Isolation, Active-Threat, CVE-2020-1380, Zero-Day Attack, Internet Explorer, IE

Introducing Cloud App Isolation

Posted by James Locus on May 19, 2020

Manage Shadow IT and Stop Data Loss Through Cloud Apps

Cloud Apps Are a Point of Attack

Protecting workers is a challenging task—for example, 29 percent of all attacks leverage legitimate cloud services to launch an attack. Once an attacker is inside the network, they can use the same cloud app to siphon or exfiltrate valuable information out of the organization.

 

Read More

Tags: Cloud DLP, Application Control, app security, cloud app, cloud applications, Cloud App Isolation, CASB, Cloud Access Security Broker, cloud application security, casb isolation, Isolation, Cloud-based Isolation, cloud security, DLP

Provide Secure Access for Everyone

Posted by James Locus on Mar 12, 2020

Introducing cloud-based data loss prevention with Menlo Security

 

Safeguarding Internet access is a significant problem for most businesses. In a recent Verizon Study, 6.2 percent of all data breaches result from browser-based attacks. These attacks, including watering-hole and drive-by downloads, can be costly and might lead to massive damage to an organization’s reputation.

Read More

Tags: web isolation, Cloud Proxy, SaaS Cloud Security, Endpoint Access

Secure O365 and Secure G Suite for Your Enterprise

Posted by James Locus on Mar 9, 2020

Bad actors never rest

Creating legitimate-looking fake communications from Google or Microsoft is easy and inexpensive. Novice attackers with little or no coding experience can purchase phishing packs on the dark web that they can customize and then send emails to specific targets based on social engineering intelligence. Free and compromised accounts can also be used as an attack vector , hosting documents that contain malware or links to fake web forms or other malicious sites.

Read More

Tags: email attachments, email threats, malicious links, Isolation Core

Stop Data Exfiltration with Cloud DLP

Posted by James Locus on Mar 5, 2020

Introducing cloud-based data loss prevention with Menlo Security

Sensitive data leaving a company via the web is a major concern for many networks. Bad actors perpetrate 69 percent of external data breach attacks and represent the largest threat to organizations that are not using cloud isolation. For our customers, however, we prevent these attacks.

Because external actors frequently rely on phishing and malware insertion, Menlo Security customers are largely protected through our browser and email isolation. The remaining threat vector then moves to the company’s own employees.

Read More

Tags: Isolation Core, Cloud Proxy, Cloud DLP

Browsers Protected by Menlo Security will now Prioritize the Active Browser Window and Deprioritize the Inactive Ones

Posted by James Locus on Dec 3, 2019

As any office worker knows, browser tabs have a way of multiplying during the work day. Sure - it begins innocently enough flipping back between two news articles. 

 

However, after a while, the tabs will have increased six-fold as the user inevitably gets distracted between YouTube, Spotify, and Salesforce. When done on a large scale, all those inactive tabs can eat up valuable network resources. 

Read More

Tags: Web Security, Secure Web Access, Bandwidth

Connect with us

Lists by Topic

see all

Recent Posts