<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1626328370711236&amp;ev=PageView&amp;noscript=1">
banner-blog.jpg

blog

Going Phishing During Tax Season

Posted by Jay Kelley on Mar 15, 2017

 

You’ve probably heard about businesses that have fallen victim to successful spear-phishing attacks leading to the theft of employee W-2s. But, the IRS began warning tax professionals in January they are under attack, too!

Read More

Tags: phishing, security, credential theft, financial services, spear-phishing

10 Tips to Reduce Malware Threats

Posted by Kowsik Guruswamy on Mar 6, 2017



Half of the web is vulnerable to malware, as we measured recently in our State of the Web research report, making it clear that merely visiting a legitimate web site is risky.

Read More

Tags: malware, malware vulnerabilities, cybersecurity, cyber theft, cyber threats, ransomware, Google Chrome, security strategy, security, phishing, anti-phishing, bitcoins, credential theft, isolation

Looking Back at an Incredible 2016

Posted by Peter Lunk on Jan 23, 2017
Read More

Tags: isolation, malware, security, global managed security service, channel partner, gateway

10 Reasons Why You Shouldn’t Consider Isolation!

Posted by Jason Steer on Nov 29, 2016

This is intended to be a little tongue in cheek for readers, however it’s been written to provoke discussion on how organizations continue to do the same things they have done for the last 15 years without thinking. 

Read More

Tags: anti-phishing, phishing prevention, malicious code, malware, isolation, cybersecurity, security, security strategy, ransomware, spear-phishing

Protecting Asian Business from Cyberattack – Isolate Risky Content

Posted by Stephanie Boo on Nov 10, 2016

Across the Asia Pacific, cyber security communities are sharing information about malicious actor techniques from other regions, in hopes of avoiding copycat attacks. In one case, data theft from a US government agency exploit was foiled when individual users repeatedly asked IT to have their malware-ridden laptops re-imaged. It turns out, it wasn’t just malware that was the security issue – the malware was a cover up for a sophisticated ring of insider data-stealing activities. Each time the externally-based ring leader thought their data stealing attempts might be discovered, the malware was inflicted on internal users to force a reimage and cover their tracks.

Read More

Tags: cybersecurity, malware, malware vulnerabilities, Australian Information Security Association, security, isolation, phishing prevention

The Patient Zero Myth

Posted by Greg Maudsley on Oct 26, 2016

In medical terms, Patient Zero is loosely defined as the first human infected by a new or recently discovered viral or bacterial outbreak. The term has found its way into the IT security lexicon where its corollary is the first individual to be infected by a new malware strain, or the first victim in a phishing campaign.

Read More

Tags: blog, security, cybersecurity, malware, malicious code, phishing, phishing prevention, anti-phishing, isolation

Mass Downloads of Documents Still Include Malware

Posted by Greg Cross on Oct 14, 2016

A new and rapid growth trend during the U.S. political season is that various treasure troves of leaked documents now await  the masses on the Internet, including via sites like WikiLeaks and "Guccifer 2.0’s” latest Wordpress blog. 

Read More

Tags: malware, pdf, phishing, risk, cybersecurity, security, isolation, malicious code, malware vulnerabilities, email attachments, cyber theft, ransomware, security strategy

Reducing Risk by Eliminating the Phish

Posted by Greg Maudsley on Oct 4, 2016

 Recently, I’ve been speaking with a lot of CISOs, security industry veterans, and analysts about risk.

Read More

Tags: phishing, isolation, security, cybersecurity, malware, drive-by exploits, threats, ransomware, credential theft

Business Benefit of Isolation

Posted by Jason Steer on Aug 23, 2016

 

Isolation is still the new kid on the block - in Europe we spend much of our time educating our customers and partners on what Isolation means, how Isolation works and how it mitigates the risk of web server & web browser vulnerabilities exploited by cyber criminals on a daily basis. It’s not just Menlo Security that is looking at the web in this way; Gartner themselves highlight the value of Isolation as part of the new Preventive capabilities customers can adopt.

One of the recurring questions from almost all the meetings I have had to date is what does Isolation mean in terms of business benefit? Every technology company I have worked for in my career has always focused on the technical benefits, architecture and how it solves the technical problem, but hasn’t talked enough to the business benefits. Without a clear link to business benefit, we have to connect Isolation to the overall Cyber Security strategy a CIO is working towards.

So briefly what are the business benefits of Isolation?

Read More

Tags: flash, malware, threats, ransomware, isolation, security

First U.S. Patent on Cloud Isolation - A Milestone for Menlo Security

Posted by Peter Lunk on Aug 17, 2016

Changing the security market for the better is important work. A key milestone for Menlo Security was receiving our first technology patent for the development of important intellectual property in our breakthrough threat isolation solution. Initially filed in 2011, U.S. Patent No. 9,391,832 was issued for Adaptive Clientless Rendering (ACR) — a cornerstone capability in our isolation platform architecture. Making isolation easy to use and deploy is validation of our pioneering efforts and marks a proud moment for Menlo Security.   

Read More

Tags: Patents, malware, threats, isolation, security

Connect with us

Lists by Topic

see all

Recent Posts

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.