Internet Isolation Enables a Zero Trust Approach That Protects Remote Users from Cybersecurity Threats without Impacting the User Experience.
Federal agencies are being forced to rethink the way they empower public servants with the tools and information they need to make government work. Even before the Covid-19 global pandemic, agencies were undergoing digital transformation in an effort to create efficiencies and be more responsive to citizens. Then, as government employees and contractors moved from their office cubicle to their dining room table—literally overnight—federal IT organizations had to scramble to enable application access to a nearly 100 percent remote workforce.
Read More
Tags:
isolation,
Internet Isolation,
zero trust,
new normal,
federal cybersecurity,
government digital transformation,
next-gen secure web gateway
Isolation Provides Malware-Free Browsing Regardless of Patch Status
Imagine your life today without being able to freely browse the web. Browsers have put the entire world on our devices and in the palm of our hand—easily searchable in a powerful and seamless experience. This is where work happens, in browsers, email and shared files. Securing this this essential (yet vulnerable) entry point, ensures malicious actors wouldn’t be able to launch, much less carry out, an attack. Simply put, Chrome is critical to getting business done, as it is used by nearly two-thirds of devices worldwide.
Read More
Tags:
cybersecurity,
Google Chrome,
Internet Isolation,
cloud security,
zero-days,
CVE-2020-16017,
CVE-2020-16013,
web browser,
CVE-2020-16009,
CVE-2020-15999
The Still-Active Zero-Day Exploit Threatens the Frequently Vulnerable JavaScript Engine
Customers of Menlo Security using Internet Explorer (IE) are protected against a recent and still-active zero-day exploit using Internet Explorer, as outlined by Microsoft’s security update CVE-2020-1380.
Read More
Tags:
malware,
isolaton,
Internet Isolation,
Active-Threat,
CVE-2020-1380,
Zero-Day Attack,
Internet Explorer,
IE
Not all vulnerabilities are created equal. It’s true. In a perfect world, organizations should be able to patch every vulnerability on every client immediately. But we don’t live in a perfect world. Some vulnerabilities pose a much greater risk to the organization than others and should be prioritized.
Read More
Tags:
Web Security,
ZeroTrust,
Internet Isolation,
CVE
Not all Internet isolation solutions are created equal. Just ask our customers. One of them learned the hard way.
Read More
Tags:
Web Security,
ZeroTrust,
ZeroTrust Internet,
Guide,,
Internet Isolation
Another day, another validation that Internet isolation really is the best cybersecurity protection out there.
Last week, Google released an urgent Chrome update to patch an actively exploited zero-day known as CVE-2019-13720, a memory corruption bug that uses a use-after-free vulnerability in audio that allows a threat actor to access memory after it has been freed. This allows anyone to cause a program to crash, execute arbitrary code, or even enable full remote code execution scenarios. Pretty serious stuff that should worry even the most secure enterprises.
Read More
Tags:
Web Security,
ZeroTrust,
Internet Isolation,
CVE
It started as a phishing expedition and ended up being the largest data breach in the history of Singapore. It was June 2018. The FIFA World Cup was in full swing, Jurassic World hit theaters worldwide, and a low-level administrator with SingHealth, the country’s largest healthcare network, clicked on a seemingly innocent link in an email.
Read More
Tags:
browser isolation,
Web Security,
ZeroTrust,
ZeroTrust Internet,
Guide,,
Internet Isolation
Street magicians have a secret: If you want to hide something, hide it in plain sight. It’s how hidden card tricks, sleight of hand and most illusions work. Unfortunately, malicious actors are learning how to use the same concept to sneak malware past traditional cybersecurity tools and onto users’ computers. And, it’s causing havoc on two fronts: enterprise security and user productivity.
Read More
Tags:
Web Security,
Internet Isolation,
RAT
You understand the technology and how it is engineered. Now let’s talk about how Internet isolation works in the real world. Once implemented, how does it protect users from specific cyberthreats that are common in today’s always-on, 24/7 world?
Read More
Tags:
Web Security,
ZeroTrust,
ZeroTrust Internet,
Guide,,
Internet Isolation
Let’s face it. Everything we do today is on the Internet. We communicate through webmail. We collaborate through project management platforms. We share documents in shared storage accounts. We keep track of customers, keep an eye on inventory, and monitor fleets of trucks—all on the Internet.
Read More
Tags:
Web Security,
ZeroTrust,
ZeroTrust Internet,
Guide,,
Internet Isolation