The past 12 months have been a challenging year for security professionals everywhere. But in particular for government and defence organisations battling the growing intensity and sophistication of cyber threats in a year heavily influenced by the pandemic, leaving many battered and bruised.
Read More
Tags:
isolation,
SASE,
CDR,
Government,
Resilience,
Defence
We believe the report validates customer migration from on-premises to the cloud and security functions’ convergence into a SWG platform architecture.
Gartner’s 2020 Magic Quadrant for Secure Web Gateways (SWG) is now live, and Menlo Security has been named a Visionary for the third year in a row. In fact, Menlo Security moved further right in completeness of vision and upwards in ability to execute the and we believe is now on the cusp of the Leaders’ quadrant.
Read More
Tags:
isolation,
web isolation,
SWG,
SASE,
CASB,
secure web gateway,
Menlo Security,
Gartner MQ,
ZTPA,
Gartner Magic Quadrant,
Menlo
Internet Isolation Enables a Zero Trust Approach That Protects Remote Users from Cybersecurity Threats without Impacting the User Experience.
Federal agencies are being forced to rethink the way they empower public servants with the tools and information they need to make government work. Even before the Covid-19 global pandemic, agencies were undergoing digital transformation in an effort to create efficiencies and be more responsive to citizens. Then, as government employees and contractors moved from their office cubicle to their dining room table—literally overnight—federal IT organizations had to scramble to enable application access to a nearly 100 percent remote workforce.
Read More
Tags:
isolation,
Internet Isolation,
zero trust,
new normal,
federal cybersecurity,
government digital transformation,
next-gen secure web gateway
Cybersecurity warriors are in short supply these days. According to (ISC)2, 2.8 million professionals work in cybersecurity globally, but the industry would need another 4 million trained workers—500,000 in the U.S. alone—in order to properly defend organizations and close the skills gap.
Read More
Tags:
cybersecurity,
isolation,
security,
security operations center,
ISSA,
ISC)2,
SOC,
Menlo Security Platform,
unintended security gaps,
Menlo iSOC,
reskilling,
cybersecurity skills gap
Menlo Security’s iSOC—our isolation-powered SOC service—identified a credential phishing campaign targeting the hospitality industry. Menlo Labs researchers decided to take a deeper dive into the campaign and I’m glad we did, because it sure turned out to be an interesting one.
Read More
Tags:
phishing,
isolation,
captcha
Targeting People, Not the Infrastructure
Historically, many cyberattacks tended to be technology-focused and required specialized knowledge to expertly fool a network into believing the attacker was an authorized user. Spoofing, man-in-the-middle (LAN or Wi-Fi), DNS, and other attacks require actual skill (and a bit of malice) to properly execute.
Read More
Tags:
phishing,
isolation,
email isolation,
link isolation,
link wrapping
Isolation for Zero Trust Phishing Protection
Phishing sites frequently evade web and email filters because of the inability of secure gateways to detect new phishing websites or categorize them properly. According to Menlo Labs, web and email gateways wrongly categorize 10-15 percent of malicious websites as safe.
Read More
Tags:
phishing,
isolation,
URL,
email filtering,
zero trust
Large Groups of Isolated Users Shrink Your Exposure Surface
Enterprises frequently acquire an isolation solution (with Menlo for remote browser isolation) for groups of users, such as VIPs, rather than their entire workforce. While this strategy insulates VIPs from malware attacks, it assumes that only VIPs have access to potentially crippling information.
Read More
Tags:
phishing,
isolation,
Incident Response,
API,
logging
How a Fortune 500 Customer Embraced Menlo’s Isolation as Their Primary Defense Against Phishing and Email Threats.
I had the opportunity to chat with one of our largest customers the other day. I can’t mention the company name, but they are a big, well-known brand. Menlo works with eight of the ten largest banks and four of the five biggest credit card companies in the world. Let’s just say it was one of them.
Read More
Tags:
malware,
cybersecurity,
phishing,
isolation,
secure web gateway,
financial services security,
email security,
global cloud proxy
File-based threats are occurring with greater frequency and higher success rates as threat actors have continued to hone and adapt their social engineering and spearphishing skills to fit today’s trends, such as cloud transformation. Consider that hundreds of millions of users are now working remotely and relying on Software as a Service (SaaS) platforms and rich web apps to improve mobility and productivity.
Read More
Tags:
isolation,
security,
SaaS,
internet access,
cloud-delivered security,
remote access,
CDR,
Content Reconstruction