Government Agencies Need to Rethink How They Provide Fast and Reliable—Yet Secure—Access to Remote Users.
Covid-19 and the resulting fallout has laid bare the inefficiencies of government and a failure to address these issues with existing digital transformation initiatives, according to a new report published by Gartner. These inefficiencies, the report said, is undermining the productivity of the federal workforce at a time when agencies dealing with the pandemic, the government response, and economic recovery need to react quickly to fast-changing conditions with organizational agility.
Read More
Tags:
cybersecurity,
gartner,
web isolation,
COVID-19,
cloud-delivered security,
federal agency,
digital government
Build a Security Approach that Is Integrated, Simple, and Cloud Delivered
Last month I had the absolute pleasure of chatting with Kenny Yeo, a cybersecurity analyst from Frost and Sullivan and one of the leading security experts in the Asia Pacific region. Kenny and I locked horns during a conference recently, and we started sharing notes on how SaaS security has evolved. It turned into quite an interesting conversation, so I wanted to get his take on recent network and security shifts that are impacting companies.
Read More
Tags:
cybersecurity,
security,
web isolation,
Cloud Adoption,
cloud security,
cloud-delivered security,
digital transformation and security,
Frost and Sullivan
Secure Remote Worker Use Case 3:
URL Filtering, SaaS Access Control, and Visibility
A cloud-based secure web gateway (SWG) gives cybersecurity teams complete visibility and control over traffic that bypasses the VPN. Consider these two use cases.
Read More
Tags:
malware,
phishing,
security,
spear-phishing,
DLP,
cloud-delivered security,
visibility and control,
URL filtering,
VPN,
SaaS access,
remote users,
acceptable use policies
Secure Remote Worker Use Case 2: Security and Visibility of Data and Traffic
As we now accept the new norm, combating malicious cyberthreats comes down to two things: visibility and control. If you can monitor traffic flowing to and from users’ devices and control how that traffic behaves and is secured, a malicious actor would be hard pressed to infiltrate your network and do harm.
Read More
Tags:
phishing,
security,
HTTS,
HTTPS,
SSL Inspection,
DLP,
cloud-delivered security,
visibility and control,
security policies,
URL filtering,
VPN,
secure web gateway
File-based threats are occurring with greater frequency and higher success rates as threat actors have continued to hone and adapt their social engineering and spearphishing skills to fit today’s trends, such as cloud transformation. Consider that hundreds of millions of users are now working remotely and relying on Software as a Service (SaaS) platforms and rich web apps to improve mobility and productivity.
Read More
Tags:
isolation,
security,
SaaS,
internet access,
cloud-delivered security,
remote access,
CDR,
Content Reconstruction
Secure Remote Worker Use Case 1: Ensure Fast, Secure Access to SaaS Platforms
Even before Covid-19 forced the adoption of work-from-home policies across the globe, the workforce had been getting more remote, more distributed, and more dependent on Software as a Service (SaaS) platforms. In turn, organizations have been looking for a new way to protect these remote users from today’s increasingly sophisticated cyberattacks. Phishing attacks remain one of the biggest threats as malicious attackers take advantage of the new normal to trick users into downloading malware or giving up their credentials.
Read More
Tags:
phishing,
ransomware,
anti-phishing,
SWG,
Secure Remote Worker,
Working From Home,
CASB,
cloud-delivered security,
Digital Workforce,
Remote Work
Menlo labs has observed limited attacks, where attackers are continuing to exploit CVE-2017-11882, an old Microsoft exploit with a patch that was issued more than two years ago. As a matter of fact, an FBI report published on May 12 2020, listed it as one of the top 10 vulnerabilities routinely getting exploited. We are still analyzing some details of the malware involved in the three attacks and will post it in part 2 of this series. The following are some noteworthy features in all the attacks we identified
Read More
Tags:
phishing,
ransomware,
anti-phishing,
SWG,
Secure Remote Worker,
Working From Home,
CASB,
cloud-delivered security,
Digital Workforce,
Remote Work
Threat actors can be ruthless. They use social engineering to comb through people’s personal and professional lives to uncover details that they can use in spearphishing campaigns to manipulate users into unwittingly downloading malware or giving up their credentials
Read More
Tags:
phishing,
isolation,
security,
Isolation Core,
Cloud Proxy,
Secure Remote Worker,
Remote Working,
SaaS,
internet access,
cloud-delivered security