banner-blog.jpg

BLOG

Honorably Serving Our Veterans Wherever the Mission Goes

Posted by Mehul Patel on Nov 2, 2020

The VA Has an Opportunity to Rethink Its Cybersecurity Posture in the New Normal with Cloud Web Isolation.

Covid-19 and its impact have pushed federal workers out from behind the firewall to the edge of the network in home offices. Fortunately, the Department of Veterans Affairs had already embarked on an aggressive IT modernization initiative—providing the framework for making sure remote workers have fast and consistent access to the tools and information they need, wherever the mission takes them.

Read More

Tags: malware, cybersecurity, phishing, ransomware, web isolation, COVID-19, Menlo Security, federal security, IT modernization, drive-by attacks, expanding attack surface, digital transformation, Veterans Affairs, VA

Update on DoD’s Cloud-Based Internet Isolation

Posted by Kowsik Guruswamy on Oct 28, 2020

I’m very proud of what we do at Menlo Security. We work very hard to make sure organizations and users around the world can safely access the tools and information they need to keep businesses running. We prevent confidential data from falling into the wrong hands. We protect users’ most personal data from malicious actors. And we enable remote productivity for organizations impacted by pandemics, wildfires, and other hazards.

Read More

Tags: phishing, secure web gateway, Menlo Security, By Light, DISA, federal cybersecurity, zero-days, drive-bys

Safeguarding Our Health Information in a Global Pandemic

Posted by Mehul Patel on Oct 20, 2020

HHS Can Use Cloud Web Isolation to Stop Cybersecurity Threats without Impacting Productivity.

The U.S. Department of Health and Human Services (HHS) has been on the front lines of the Covid-19 pandemic, working with other federal departments to coordinate national policy and responses to address the public health crisis. However, just as in enterprises around the world, HHS has had to deal with shelter-in-place orders and work-from-home policies that have scattered users out from behind the data security perimeter to home offices. The ability of employees to log in to critical systems in the middle of a global pandemic is mission critical and a national security priority, but the department’s systems and the data that powers them need to continue to be secured without impacting business continuity or the native user experience.

Read More

Tags: cybersecurity, phishing, web isolation, secure web gateway, NIST, Data Privacy, Health IT, HHS, Office for Civil Rights

Five Cloud Security Considerations for CISOs

Posted by Kowsik Guruswamy on Oct 8, 2020

Discover How You Can Protect Users and the Organization in Today’s New Normal

The past six months have been a whirlwind of change. Security teams across the world have scrambled to empower distributed users with the tools and information they need to keep businesses running. Now everyone is accessing everything from everywhere, with limited control and visibility into who is accessing what, where, and on what device.

Read More

Tags: cybersecurity, phishing, spearphishing, cyberattacks, Web Security, HTTPS, SaaS, cloud security, VPN, email security, new normal, cloud apps, BYOD

Menlo Threat Labs Uncovers a Phishing Attack Using Captchas

Posted by Vinay Pidathala on Sep 30, 2020

Menlo Security’s iSOC—our isolation-powered SOC service—identified a credential phishing campaign targeting the hospitality industry. Menlo Labs researchers decided to take a deeper dive into the campaign and I’m glad we did, because it sure turned out to be an interesting one.

 

Read More

Tags: phishing, isolation, captcha

Phishing Attacks Are Scarily Easy to Build

Posted by James Locus on Sep 22, 2020

Targeting People, Not the Infrastructure

Historically, many cyberattacks tended to be technology-focused and required specialized knowledge to expertly fool a network into believing the attacker was an authorized user. Spoofing, man-in-the-middle (LAN or Wi-Fi), DNS, and other attacks require actual skill (and a bit of malice) to properly execute.

Read More

Tags: phishing, isolation, email isolation, link isolation, link wrapping

How Should Zero Trust Apply to Phishing?

Posted by James Locus on Sep 3, 2020

Isolation for Zero Trust Phishing Protection

Phishing sites frequently evade web and email filters because of the inability of secure gateways to detect new phishing websites or categorize them properly. According to Menlo Labs, web and email gateways wrongly categorize 10-15 percent of malicious websites as safe.

Read More

Tags: phishing, isolation, URL, email filtering, zero trust

How Isolation Changes Incident Response

Posted by James Locus on Aug 20, 2020

Large Groups of Isolated Users Shrink Your Exposure Surface

Enterprises frequently acquire an isolation solution (with Menlo for remote browser isolation) for groups of users, such as VIPs, rather than their entire workforce. While this strategy insulates VIPs from malware attacks, it assumes that only VIPs have access to potentially crippling information.

Read More

Tags: phishing, isolation, Incident Response, API, logging

The URL “Danger Zone”

Posted by James Locus on Aug 18, 2020

Inadequate Security Policies with Uncategorized Sites

The challenge most email gateways face is how to protect against URL-based threats that exist within a “danger zone”— the period when phishing sites are allowed to sneak into the network as uncategorized sites.

 

Read More

Tags: phishing, email isolation, uncategorized sites, URL, email filtering, danger

Providing 100 Percent Malware-free Email and Web Browsing

Posted by Kowsik Guruswamy on Aug 11, 2020

How a Fortune 500 Customer Embraced Menlo’s Isolation as Their Primary Defense Against Phishing and Email Threats.

I had the opportunity to chat with one of our largest customers the other day. I can’t mention the company name, but they are a big, well-known brand. Menlo works with eight of the ten largest banks and four of the five biggest credit card companies in the world. Let’s just say it was one of them.

 

Read More

Tags: malware, cybersecurity, phishing, isolation, secure web gateway, financial services security, email security, global cloud proxy

Connect with us

Lists by Topic

see all

Recent Posts