banner-blog.jpg

MENLO SECURITY BLOG

Articles, trends, and advice on cloud security without compromise. Keep up with the latest blog insights on web isolation, network cybersecurity, malware, and more.

Saying ‘no’ to the cyber status quo

Posted by Brett Raybould on Apr 8, 2021

Why post-pandemic cybersecurity needs a new normal

Is the end finally in sight? The UK's successful vaccination programme has many people hoping that Spring might see a phased return to normal. Maybe a mass migration back to the office really is in the offing.

Read More

Tags: cyber security, SWG, Secure Remote Worker, Remote Working, SaaS, BYOD

Menlo Security Celebrates Winners of First Annual APAC Partner of the Year Awards

Posted by Adel Eid on Apr 1, 2021

Today we are celebrating our partner community and announcing the winners of our first annual Partner of the Year award winners in the APAC region. As we continue to evolve by expanding our Secure Web Gateway (SWG) and SASE Security portfolio to cover more use cases, our partner community and ecosystem are becoming an even more integral part of our success.

Read More

Tags: cyber security, SWG, secure web gateway, Menlo Security, APAC, APAC Partner Awards, Partner Program, Sales Enablement, Sales Training

Encouraging Women While Celebrating International Women’s Day and National Women’s Month

Posted by Poornima DeBolle on Mar 16, 2021

March is the month of the woman. We celebrate International Women’s Day on March 8, and the entire month is National Women’s Month. Menlo Security’s co-founder and CPO reflects on her career journey and what she has learned along the way. She shares her thoughts about how the cyber security industry can encourage more women to pursue senior leadership roles and most importantly, why the pipeline is an issue.

Read More

Tags: cyber security, National Women’s History Month, International Women’s Day

Sandboxes Are Vulnerable but Not Obsolete. Can a Secure Web Gateway with Internet Isolation Save the Day?

Posted by Mehul Patel on Apr 15, 2019

Sandboxes Are Vulnerable but Not Obsolete. Can a Secure Web Gateway with Internet Isolation Save the Day?

Read More

Tags: secure web gateways, cyber security, isolation platform, browser isolation, web browser isolation, Web Security

Isolation: really making it 'FIN' for FIN7

Posted by Jay Kelley on Apr 10, 2018

It was reported on April 1st – appropriate that it was April Fool’s Day – by a number of media outlets that Hudson’s Bay Company, the Canada-based parent company of iconic luxury retailer Saks Fifth Avenue, as well as Lord & Taylor and Saks Off 5th, had been hacked. Reportedly, over 5 million credit and debit card numbers of customers of the retailers had been stolen, and supposedly were for sale on the Dark Web.

Read More

Tags: hacked, hackers, phishing attack, cyber security, isolation technology, browser isolation

Love and malware

Posted by Jay Kelley on Feb 14, 2018

 

 

“Love is like a virus. It can happen to anybody at any time.” – Maya Angelou

 

It’s Valentine’s Day, and love is in the air.

 

Unfortunately, so are emails riddled with malware.

Read More

Tags: malware, cyber security, isolation technology, isolation platform, virus

 A New Approach to End Typosquatting

Posted by Jay Kelley on Feb 13, 2018

 

 “Simplicity is the ultimate sophistication.” – Leonardo da Vinci

 

This quote even holds true when it comes to cyber threats.

 

While experts discuss the impending battle royal between cybersecurity, and attackers and hackers, focusing in on “good AI” vs. “evil AI” in an ever-escalating, highly-sophisticated cyber arms race, it’s sometimes the simplest of threats – and mistakes – that can be the most dangerous and frustrating.

Read More

Tags: cyber security, isolation technology, typosquatting

For Feds, DMARC is a Start, But More is Needed

Posted by Jay Kelley on Nov 9, 2017

 

Last month, the U.S. Department of Homeland Security directed federal agencies to begin employing enhanced security methods and protocols on all government email accounts. This action is an effort to halt the impersonation of U.S. government email domains, referred to as spoofing, by attackers intent on deploying a dizzying array of cyber attacks typically initiated by a phishing campaign. Given that many reports place the start of a cyber attack squarely on phishing campaigns—some reports place the figure at over 90% of cyberattacks are as the result of phishing—it makes sense that the DHS would require greater email security for federal government email accounts and inboxes.

Read More

Tags: isolation, cyber attacks, phishing attack, cyber security, DMARC

Mission Impossible 17 – Spear Phishing

Posted by Jason Steer on Oct 24, 2017

Spear phishing attacks continue to plague businesses of all sizes, across all sectors. Detection of these messages remains an impossible feat. Spear phishing messages plague everyone and their intent ranges from delivering malware or ransomware, to stealing passwords and personal information, such as bank account information. All of these things have a high value in the online criminal world, hence why spear phishing is the most popular tool in the cyber attack arsenal today.

Read More

Tags: ransomware, anti-phishing, spear-phishing, cyber attacks, cyber training, cyber security

Isolate ALL: Unlocking Isolation's Full Potential

Posted by Greg Maudsley on Oct 19, 2017

Threat isolation is fast becoming the new “must-have” technology for IT security teams. It has gained recognition from leading analysts, and enterprise adoption is taking off. Case-in-point, Menlo Security now has hundreds-of-thousands of users across the globe using isolation to access the web without worry of malware infections. What is of particular importance is that 90% of these Menlo Security customers are isolating ALL of their web traffic, which unlocks isolation’s full potential. So why is this significant? 

Read More

Tags: cyber threats, web isolation, cyber security, isolation technology

Connect with us

Lists by Topic

see all

Recent Posts