banner-blog.jpg

MENLO SECURITY BLOG

Articles, trends, and advice on cloud security without compromise. Keep up with the latest blog insights on web isolation, network cybersecurity, malware, and more.

It’s Time for Federal Agencies to Stop Malware for Good

Posted by Menlo Security on Mar 12, 2021

Cybersecurity teams at federal agencies all face the same challenge: How do you protect against emerging threats when the agency work environment keeps evolving?

 

Read More

Tags: malware, secure web gateways, Internet Isolation, Isolation Core, cloud security, Remote Work, federal cybersecurity

Zero Trust: Guilty Until Proven Innocent

Posted by Jack Miller on Mar 11, 2021

Zero Trust Powered by Isolation is the only Way to Secure Work.

I had a great opportunity to chat with Tom Field of Information Security Media Group (ISMG) last month about Zero Trust. He wanted to know how Menlo enables this new way of thinking about cybersecurity and how our isolation approach can be applied in the mature financial services sector.

Read More

Tags: financial services, ZeroTrust, Internet Isolation, Remote Work, ISMG

Remote Browser Isolation—Creating a Patch Buffer

Posted by Vinay Pidathala on Mar 8, 2021

The year 2020 was a very tough one for enterprises for many reasons. Perhaps one of the biggest reasons was that COVID-19 forced businesses and other organizations to make an almost overnight transition to remote work. On the other hand, cyber attackers had a great year. Remote work and the shift to the cloud have resulted in a greatly increased attack surface area that attackers have capitalized on.

Read More

Tags: ransomware, Remote Work, credential phishing, Patch Buffer, patch lag

Isolate and liberate

Posted by Tom Mcvey on Jan 13, 2021

How Web Isolation Is Setting the Stage for a New, Future-ready Approach to Security.

Imagine you’re an Olympic sprinter. The starting gun is about to go off when race officials announce a late change. You’ll need to hop a zig-zag pattern on one foot while still maintaining your original two-foot qualifying speed—or face a DQ.

 

Read More

Tags: web isolation, Web Security, Secure Remote Worker, Remote Work, digital transformation, ACR technology

Fast User Access to SaaS for Users on Home Wi-Fi

Posted by Mehul Patel on Jul 9, 2020

Secure Remote Worker Use Case 1: Ensure Fast, Secure Access to SaaS Platforms

Even before Covid-19 forced the adoption of work-from-home policies across the globe, the workforce had been getting more remote, more distributed, and more dependent on Software as a Service (SaaS) platforms. In turn, organizations have been looking for a new way to protect these remote users from today’s increasingly sophisticated cyberattacks. Phishing attacks remain one of the biggest threats as malicious attackers take advantage of the new normal to trick users into downloading malware or giving up their credentials.

 

Read More

Tags: phishing, ransomware, anti-phishing, SWG, Secure Remote Worker, Working From Home, CASB, cloud-delivered security, Digital Workforce, Remote Work

Securing the New Normal: Future of Work

Posted by Mehul Patel on Jul 2, 2020

For most of us, working has always been social. We’d commute to an office every day where we’d spend our day in strategy meetings and whiteboard sessions, grab a coffee to catch up with colleagues, and catch the boss while walking the hall to provide the latest project update. Once in a while, if we had a personal appointment, a customer meeting across town, or an early-morning conference call from overseas, we’d be able to work from home, logging in from a VPN where we’d have secure access to productivity tools.

 

Read More

Tags: phishing, ransomware, anti-phishing, SWG, Secure Remote Worker, CASB, Digital Workforce, Remote Work

Equation Editor—Attackers continue to exploit CVE-2017-1182….

Posted by Vinay Pidathala on Jun 30, 2020

Menlo labs has observed limited attacks, where attackers are continuing to exploit CVE-2017-11882, an old Microsoft exploit with a patch that was issued more than two years ago. As a matter of fact, an FBI report published on May 12 2020, listed it as one of the top 10 vulnerabilities routinely getting exploited. We are still analyzing some details of the malware involved in the three attacks and will post it in part 2 of this series. The following are some noteworthy features in all the attacks we identified

Read More

Tags: phishing, ransomware, anti-phishing, SWG, Secure Remote Worker, Working From Home, CASB, cloud-delivered security, Digital Workforce, Remote Work

Connect with us

Lists by Topic

see all

Recent Posts