<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1626328370711236&amp;ev=PageView&amp;noscript=1">
banner-blog.jpg

blog

Browsing the Web is a Leap into the Unknown

Posted by Kowsik Guruswamy on Dec 13, 2016

Users must recognize that they are taking a significant risk when connecting directly to the Internet. The new Menlo Security State of The Web report reveals that nearly half (46%) of the Internet’s top 1 million web sites, as ranked by Alexa, are risky.  

Read More

Tags: state of the web, security strategy, cybersecurity, isolation, cyber theft, anti-phishing, malware, malware vulnerabilities, blog

The Patient Zero Myth

Posted by Greg Maudsley on Oct 26, 2016

In medical terms, Patient Zero is loosely defined as the first human infected by a new or recently discovered viral or bacterial outbreak. The term has found its way into the IT security lexicon where its corollary is the first individual to be infected by a new malware strain, or the first victim in a phishing campaign.

Read More

Tags: blog, security, cybersecurity, malware, malicious code, phishing, phishing prevention, anti-phishing, isolation

Freedom, Exploration and Menlo Security

Posted by Greg Maudsley on Jul 13, 2016

T.S. Elliot once said, “We shall not cease from exploration, and the end of all our exploring will be to arrive where we started and know the place for the first time.”  This quote rings true because, as humans, exploration is deeply rooted in our nature. From the time we are toddlers, we seek knowledge through discoveries in our immediate physical environment, one room at a time in our homes, in the backyard, at the park, all under the watchful eyes of our parents and caregivers.

Read More

Tags: blog, innovation, security, isolation, ransomware, malware

Channel Expansion in Americas

Posted by Doug Schultz on Jun 16, 2016

I’m so excited about our recently announced partnership with Cloud Harmonics. We believe having a clear definitive Channel strategy should be a core part of your security provider’s go-to-market effort from the beginning.

The addition of Cloud Harmonics as a Menlo Security strategic distribution partner will help increase our reach and accelerate the adoption of our unique and patented Isolation technology.

Read More

Tags: blog, isolation, threat intelligence, security, ransomware

Rombertik - Rise of Self Aware Malware

Posted by Kowsik Guruswamy on May 5, 2015

Cisco Threat Blog recently published information on the Rombertik Malware which takes a fair number of steps to evade sandboxes (not exactly rocket science), but goes even further to disrupt reverse engineering and analysis by malware experts. Fundamentally the Rombertik malware follows the well trodden exploitation life cycle:

Read More

Tags: malware, cybersecurity, blog, sandbox

Menlo Security CEO & Founder Honored at RSA’s Innovation Sandbox

Posted by Kowsik Guruswamy on Apr 21, 2015

Everyone - or at least everyone who cares about security - knows that the 2015 RSA Security Conference is being held this week in sunny San Francisco, CA. This year marks the 10th anniversary of the RSA Innovation Sandbox Award, which since 2005 has been granted to an emerging company seen as having "the potential to transform the information security industry." In 2010 the winning company was Altor Networks, a pioneer in virtualization security which was acquired by Juniper that same year. Menlo Security's founder, Amir Ben-Efraim, was also the founder of Altor and he was honored at the decennial anniversary event. We're thrilled about the recognition for Amir and his past work, but like him we're even more excited about the future and the transformational potential of a new model for security. More to come, soon...

Read More

Tags: rsa, blog, innovation

My Take on the M-Trends 2014 Cyber Security Report

Posted by Kowsik Guruswamy on Feb 22, 2015

Mandiant recently released their M-Trends 2014 cyber security report that contains a fair bit of analysis of cyber security, top trends for 2014 as well as their conclusion that cyber security problems are here to stay, but far too many organizations are unprepared for the inevitable breach.

Read More

Tags: malware, cybersecurity, blog, trends

2015 - Shift in Attack Vectors

Posted by Kowsik Guruswamy on Jan 26, 2015

In 2014, we saw malware attacks and hacks like never before. Headlines amplified the aftermath of several large-scale breaches, making cyber security both a board-level discussion and a national priority.

Read More

Tags: malware, ssl, IoT, blog, containers

Connect with us

Lists by Topic

see all

Recent Posts

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.