<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1626328370711236&amp;ev=PageView&amp;noscript=1">
banner-blog.jpg

blog

Stop Phishing With Technology AND Training

Posted by Jay Kelley on Aug 17, 2017

While Black Hat USA 2017 ended three weeks ago, I wanted to share my thoughts and experiences on my very first Black Hat USA 2017 after being in security for 15+ years. 

Read More

Tags: Black Hat Conference, black hat, Ichthyology, cyber attacks, cyber theft, cybersecurity, cyber training, authentication and application security, phishing training, phishing attacks, credential theft, malware, ransomware, spearphishing, isolation

Massive Cyber Attack Threatens End Users, Again

Posted by Jay Kelley on Jun 28, 2017

Another week, another massive cyber attack hits the world. Since the Wikileaks share, powerful new hacking tools are readily available to anyone in the world. This will not be the last attack leveraging these newly available weapons.

Read More

Tags: cyber attacks, cybersecurity, cyber threats, ransomware, isolation, remote browsers, anti-phishing, security strategy, WannaCrypt, GoldenEye, bitcoin

Gartner Cool Vendor Report Names Menlo Security and Describes Benefits of Browser Isolation

Posted by Peter Lunk on Jun 16, 2017

If you find it challenging to prioritize which security innovations to implement this year, this latest Gartner report can help. It names Menlo Security as a 2017 Cool Vendor for Security for Mid-Size Enterprise, and explains how any resource-constrained IT team can use browser isolation to reduce exposure to malware and phishing attacks.

Read More

Tags: cyber attacks, spear-phishing, anti-phishing, isolation, cybersecurity, gartner, browser-based attacks, browser, remote browsing, email threats

Manipulating Democracy by Spearphishing Candidates

Posted by Jay Kelley on Jun 7, 2017

Recent news is all about election hacking, with the publication this week by The Intercept of a top-secret report from the U.S. National Security Agency (NSA), detailing how Russian military intelligence or state-sponsored attackers – or, maybe as Russian President Vladimir Putin stated in a recent interview, “patriotically minded” private Russian hackers – launched a multi-pronged phishing and spearphishing attack on voter registration during the 2016 U.S. presidential elections.

Read More

Tags: cyber attacks, spear-phishing, anti-phishing, isolation, infosec euope, cybersecurity

Email Phishing and Web Malware: Still the Same

Posted by Jason Steer on May 31, 2017

It’s 2017, and many organisations are still grappling with solving two of the biggest routes of attack into their business from the Internet - via their employees' in-boxes and web browsers. 

Read More

Tags: cyber attacks, spear-phishing, anti-phishing, credential theft, isolation, infosec euope, cybersecurity

Phishing & Whaling at FS-ISAC

Posted by Jay Kelley on May 22, 2017

Exhibiting at the recent FS-ISAC Annual Summit 2017 at the Dolphin Convention Center (which could have doubled as a meat locker at times because it was so cold, while other times it could have been a large sauna it was so hot and steamy!), there was a mini-monsoon outside at one point. It was like Mother Nature was mimicking the downpour of cyber attacks confronting the financial services players at the event. It was a deluge! 

Read More

Tags: FS-ISAC Annual Summit 2017, spear-phishing, cyber attacks, financial services, malware, ransomware, drive-by exploits, isolation, credential theft, cybersecurity

Detecting the Undetectable - The Punycode Homograph Attack

Posted by Jason Steer on Apr 25, 2017

Another week, another web security story where organisations need to consider how to defend against another phishing attack. 

Read More

Tags: punycode, anti-phishing, phishing prevention, remote browsing, isolation, state of the web, browser-based attacks, cyber attacks, cybersecurity

10 Tips to Reduce Malware Threats

Posted by Kowsik Guruswamy on Mar 6, 2017



Half of the web is vulnerable to malware, as we measured recently in our State of the Web research report, making it clear that merely visiting a legitimate web site is risky.

Read More

Tags: malware, malware vulnerabilities, cybersecurity, cyber theft, cyber threats, ransomware, Google Chrome, security strategy, security, phishing, anti-phishing, bitcoins, credential theft, isolation

RSA 2017 is a Wrap – Were Credential Theft and Phishing on Your Radar?

Posted by Greg Maudsley on Mar 2, 2017

There were many hot topics and cybersecurity themes at this year’s RSA Conference in San Francisco, from ransomware, to Sec Ops, to post breach mitigation.

Read More

Tags: credential theft, isolaton, Adaptive Clientless Rendering, cybersecurity, phishing, phishing prevention

Addressing the Australian Privacy Amendment (Notifiable Data Breaches) Bill

Posted by Jay Kelley on Feb 27, 2017

Just over a week ago, the Parliament of Australia passed the Privacy Amendment (Notifiable Data Breaches) Bill 2016 requiring any Australian public sector – including most Australian Government agencies, except for intelligence agencies, private sector and not-for-profit organisation with annual revenue of AU$3 million (US$2.3 million) or greater to disclose any data breach involving an individual’s personally identifiable information (PII), including but not limited to tax file number information (similar to the United States’ social security number or SSN), credit card information, and credit eligibility information. The Bill also applies to specific organisations with revenue under AU$3 million annually, including private sector health services, gyms, weight loss centres, child care centres, private schools, organisations selling or purchasing personal information, credit reporting organisations, and even individuals handling personal information as a business. According to some publications, though, if taken literally, the language in the new Bill appears to require an organisation to disclose information even if they only believe a breach has occurred.

Read More

Tags: credential theft, isolaton, Adaptive Clientless Rendering, notifiable data breaches, personally identifable information, cybersecurity

Connect with us

Lists by Topic

see all

Recent Posts

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.