banner-blog.jpg

BLOG

Shifting Security to the Cloud

Posted by Mehul Patel on Oct 13, 2020

Build a Security Approach that Is Integrated, Simple, and Cloud Delivered

Last month I had the absolute pleasure of chatting with Kenny Yeo, a cybersecurity analyst from Frost and Sullivan and one of the leading security experts in the Asia Pacific region. Kenny and I locked horns during a conference recently, and we started sharing notes on how SaaS security has evolved. It turned into quite an interesting conversation, so I wanted to get his take on recent network and security shifts that are impacting companies.

 

Read More

Tags: cybersecurity, security, web isolation, Cloud Adoption, cloud security, cloud-delivered security, digital transformation and security, Frost and Sullivan

Five Cloud Security Considerations for CISOs

Posted by Kowsik Guruswamy on Oct 8, 2020

Discover How You Can Protect Users and the Organization in Today’s New Normal

The past six months have been a whirlwind of change. Security teams across the world have scrambled to empower distributed users with the tools and information they need to keep businesses running. Now everyone is accessing everything from everywhere, with limited control and visibility into who is accessing what, where, and on what device.

Read More

Tags: cybersecurity, phishing, spearphishing, cyberattacks, Web Security, HTTPS, SaaS, cloud security, VPN, email security, new normal, cloud apps, BYOD

U.S. Department of Defense Leads the Industry with Cloud-Based Internet Isolation Program

Posted by Amir Ben-Efraim on Sep 15, 2020

Back in April 2019, the Menlo Security team learned that our Partner By Light IT Professional Services LLC and Menlo Security were one of two solution providers selected to design and implement a Cloud Based Internet Isolation (CBII) prototype capability for the Defense Information Systems Agency (DISA).

 

Read More

Tags: CBII, SWG, cloud security, remote browser isolation, AirGap, DoD

Introducing Cloud App Isolation

Posted by James Locus on May 19, 2020

Manage Shadow IT and Stop Data Loss Through Cloud Apps

Cloud Apps Are a Point of Attack

Protecting workers is a challenging task—for example, 29 percent of all attacks leverage legitimate cloud services to launch an attack. Once an attacker is inside the network, they can use the same cloud app to siphon or exfiltrate valuable information out of the organization.

 

Read More

Tags: Cloud DLP, Application Control, app security, cloud app, cloud applications, Cloud App Isolation, CASB, Cloud Access Security Broker, cloud application security, casb isolation, Isolation, Cloud-based Isolation, cloud security, DLP

Connect with us

Lists by Topic

see all

Recent Posts