<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1626328370711236&amp;ev=PageView&amp;noscript=1">
banner-blog.jpg

blog

Gartner Cool Vendor Report Names Menlo Security and Describes Benefits of Browser Isolation

Posted by Peter Lunk on Jun 16, 2017

If you find it challenging to prioritize which security innovations to implement this year, this latest Gartner report can help. It names Menlo Security as a 2017 Cool Vendor for Security for Mid-Size Enterprise, and explains how any resource-constrained IT team can use browser isolation to reduce exposure to malware and phishing attacks.

Read More

Tags: cyber attacks, spear-phishing, anti-phishing, isolation, cybersecurity, gartner, browser-based attacks, browser, remote browsing, email threats

My Browser is so 1995!

Posted by Jason Steer on Jun 13, 2016

INTRODUCTION:

Some of the fundamentals of the Web Browser, such as the DOM & Javascript, go back to 1995, 21 years ago. Many other tools & protocols such as Grep, Ping, SMTP & DNS go back even further. However from a user perspective the browser is probably the most used application on an internet enabled device today; making it a major risk for all users of the World Wide Web. Most successful cyber attacks via the web are the direct result of a design that made sense in 1995 but in 2016 is no longer practical. We have seen multiple documented attacks on many popular sites such as CNN, Forbes, The Economist, The Independent and BBC to name a few that have compromised visitors to their site via the use & abuse of Javascript. 

Read More

Tags: malware, browser, ransomware, architecture

Connect with us

Lists by Topic

see all

Recent Posts

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.