<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1626328370711236&amp;ev=PageView&amp;noscript=1">
banner-blog.jpg

blog

Isolation: really making it 'FIN' for FIN7

Posted by Jay Kelley on Apr 10, 2018

It was reported on April 1st – appropriate that it was April Fool’s Day – by a number of media outlets that Hudson’s Bay Company, the Canada-based parent company of iconic luxury retailer Saks Fifth Avenue, as well as Lord & Taylor and Saks Off 5th, had been hacked. Reportedly, over 5 million credit and debit card numbers of customers of the retailers had been stolen, and supposedly were for sale on the Dark Web.

Read More

Tags: cyber security, phishing attack, browser isolation, hacked, hackers, isolation technology

Love and malware

Posted by Jay Kelley on Feb 14, 2018

 

 

“Love is like a virus. It can happen to anybody at any time.” – Maya Angelou

 

It’s Valentine’s Day, and love is in the air.

 

Unfortunately, so are emails riddled with malware.

Read More

Tags: malware, isolation platform, isolation technology, cyber security, virus

 A New Approach to End Typosquatting

Posted by Jay Kelley on Feb 13, 2018

 

 “Simplicity is the ultimate sophistication.” – Leonardo da Vinci

 

This quote even holds true when it comes to cyber threats.

 

While experts discuss the impending battle royal between cybersecurity, and attackers and hackers, focusing in on “good AI” vs. “evil AI” in an ever-escalating, highly-sophisticated cyber arms race, it’s sometimes the simplest of threats – and mistakes – that can be the most dangerous and frustrating.

Read More

Tags: typosquatting, cyber security, isolation technology

Isolating Meltdown & Spectre

Posted by Jason Steer on Jan 9, 2018

2018 has barely started and we've already got our first big major security vulnerabilities of the year, with the media generating lots of deserved attention worldwide on them. In case you missed the news, two major CPU vulnerabilities have been disclosed by Google and several other researchers: Meltdown and Spectre

Read More

Tags: web-based vulnerabilities, remote browsers, browser-based attacks, isolation technology

The SWIFT Security Controls Framework and Isolation

Posted by Jay Kelley on Nov 7, 2017

If you are in the financial services community, you are likely well-aware of and well-acquainted with SWIFT and the services it performs. As a quick primer for the uninitiated, SWIFT is an acronym for the Society for Worldwide Interbank Financial Telecommunication, a cooperative built over forty years ago by banks and financial institutions globally to address a mutual problem: A better, more secure, and automated way to communicate inter-bank payments across borders. SWIFT addressed this common issue, and today, it is a world-leading provider of secure messaging services for over 11,000 banks, financial organizations, and enterprises in over 200 countries.

Read More

Tags: SWIFT, cyber attacks, phishing, spear-phishing, malware, isolation technology, isolation platform

Oh, JavaScript – You Devil!

Posted by Jason Steer on Oct 31, 2017

I think we’ve blogged a few times now on the risks of JavaScript and the role it plays in browser-based cyber attacks. We’ve recently seen the details of the Pornhub attack, where malicious adverts were used to target users visiting the Pornhub website and served up fake browser updates as another in a very long list of malvertising attacks.

Read More

Tags: javascript, cyber threats, coinhive, cyber attacks, isolation technology

You Are a Bad Rabbit!

Posted by Jason Steer on Oct 26, 2017

It’s another day and another cyber attack headline in the media. This time it’s another ransomware-style attack; this one is called “Bad Rabbit”. According to media reports, it has impacted organizations in Russia and Ukraine mostly, with reports of some businesses in Turkey and Germany (and possibly in Poland and Japan) also being affected (that we know of so far).

Read More

Tags: ransomware, bad rabbit, credential theft, javascript, isolation technology, web isolation, cyber threats

Isolate ALL: Unlocking Isolation's Full Potential

Posted by Greg Maudsley on Oct 19, 2017

Threat isolation is fast becoming the new “must-have” technology for IT security teams. It has gained recognition from leading analysts, and enterprise adoption is taking off. Case-in-point, Menlo Security now has hundreds-of-thousands of users across the globe using isolation to access the web without worry of malware infections. What is of particular importance is that 90% of these Menlo Security customers are isolating ALL of their web traffic, which unlocks isolation’s full potential. So why is this significant? 

Read More

Tags: cyber security, isolation technology, web isolation, cyber threats

Connect with us

Lists by Topic

see all

Recent Posts

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.