banner-blog.jpg

BLOG

Providing 100 Percent Malware-free Email and Web Browsing

Posted by Kowsik Guruswamy on Aug 11, 2020

How a Fortune 500 Customer Embraced Menlo’s Isolation as Their Primary Defense Against Phishing and Email Threats.

I had the opportunity to chat with one of our largest customers the other day. I can’t mention the company name, but they are a big, well-known brand. Menlo works with eight of the ten largest banks and four of the five biggest credit card companies in the world. Let’s just say it was one of them.

 

Read More

Tags: malware, cybersecurity, phishing, isolation, secure web gateway, financial services security, email security, global cloud proxy

Ensure DLP Protection and Visibility for Remote Workers

Posted by Mehul Patel on Jul 28, 2020

Secure Remote Worker Use Case 4: Data Loss Prevention and Visibility

Today’s workers have been flung to the far reaches of the Internet, forcing them to log in and gain access to critical business applications and data in the cloud from unsecured residential and public Internet connections. Understandably, this lack of control and visibility is keeping cybersecurity professionals up at night, wondering whether data is being exposed on the edge of this new network architecture.

Read More

Tags: cybersecurity, security, Cloud DLP, SWG, VPN, split tunneling, data loss prevention, data visibility, remote application access

Stop Phishing With Technology AND Training

Posted by Jay Kelley on Aug 17, 2017

While Black Hat USA 2017 ended three weeks ago, I wanted to share my thoughts and experiences on my very first Black Hat USA 2017 after being in security for 15+ years. 

Read More

Tags: malware, cybersecurity, isolation, ransomware, credential theft, cyber theft, black hat, cyber attacks, cyber training, authentication and application security, spearphishing, Black Hat Conference, Ichthyology, phishing training, phishing attacks

Massive Cyber Attack Threatens End Users, Again

Posted by Jay Kelley on Jun 28, 2017

Another week, another massive cyber attack hits the world. Since the Wikileaks share, powerful new hacking tools are readily available to anyone in the world. This will not be the last attack leveraging these newly available weapons.

Read More

Tags: cybersecurity, isolation, ransomware, security strategy, anti-phishing, bitcoin, cyber threats, cyber attacks, remote browsers, WannaCrypt, GoldenEye

Gartner Cool Vendor Report Names Menlo Security and Describes Benefits of Browser Isolation

Posted by Peter Lunk on Jun 16, 2017

If you find it challenging to prioritize which security innovations to implement this year, this latest Gartner report can help. It names Menlo Security as a 2017 Cool Vendor for Security for Mid-Size Enterprise, and explains how any resource-constrained IT team can use browser isolation to reduce exposure to malware and phishing attacks.

Read More

Tags: cybersecurity, isolation, browser, gartner, anti-phishing, spear-phishing, remote browsing, browser-based attacks, cyber attacks, email threats

Manipulating Democracy by Spearphishing Candidates

Posted by Jay Kelley on Jun 7, 2017

Recent news is all about election hacking, with the publication this week by The Intercept of a top-secret report from the U.S. National Security Agency (NSA), detailing how Russian military intelligence or state-sponsored attackers – or, maybe as Russian President Vladimir Putin stated in a recent interview, “patriotically minded” private Russian hackers – launched a multi-pronged phishing and spearphishing attack on voter registration during the 2016 U.S. presidential elections.

Read More

Tags: cybersecurity, isolation, anti-phishing, spear-phishing, cyber attacks, infosec euope

Email Phishing and Web Malware: Still the Same

Posted by Jason Steer on May 31, 2017

It’s 2017, and many organisations are still grappling with solving two of the biggest routes of attack into their business from the Internet - via their employees' in-boxes and web browsers. 

Read More

Tags: cybersecurity, isolation, credential theft, anti-phishing, spear-phishing, cyber attacks, infosec euope

Phishing & Whaling at FS-ISAC

Posted by Jay Kelley on May 22, 2017

Exhibiting at the recent FS-ISAC Annual Summit 2017 at the Dolphin Convention Center (which could have doubled as a meat locker at times because it was so cold, while other times it could have been a large sauna it was so hot and steamy!), there was a mini-monsoon outside at one point. It was like Mother Nature was mimicking the downpour of cyber attacks confronting the financial services players at the event. It was a deluge! 

Read More

Tags: malware, cybersecurity, isolation, ransomware, credential theft, financial services, drive-by exploits, spear-phishing, cyber attacks, FS-ISAC Annual Summit 2017

Detecting the Undetectable - The Punycode Homograph Attack

Posted by Jason Steer on Apr 25, 2017

Another week, another web security story where organisations need to consider how to defend against another phishing attack. 

Read More

Tags: cybersecurity, isolation, anti-phishing, phishing prevention, state of the web, remote browsing, browser-based attacks, cyber attacks, punycode

10 Tips to Reduce Malware Threats

Posted by Kowsik Guruswamy on Mar 6, 2017



Half of the web is vulnerable to malware, as we measured recently in our State of the Web research report, making it clear that merely visiting a legitimate web site is risky.

Read More

Tags: malware, cybersecurity, phishing, isolation, security, ransomware, credential theft, malware vulnerabilities, cyber theft, security strategy, anti-phishing, cyber threats, Google Chrome, bitcoins

Connect with us

Lists by Topic

see all

Recent Posts