banner-blog.jpg

MENLO SECURITY BLOG

Articles, trends, and advice on cloud security without compromise. Keep up with the latest blog insights on web isolation, network cybersecurity, malware, and more.

It’s Time to Address the Growing Cybersecurity Skills Gap

Posted by Mehul Patel on Oct 15, 2020

Cybersecurity warriors are in short supply these days. According to (ISC)2, 2.8 million professionals work in cybersecurity globally, but the industry would need another 4 million trained workers—500,000 in the U.S. alone—in order to properly defend organizations and close the skills gap.

Read More

Tags: cybersecurity, isolation, security, security operations center, ISSA, ISC)2, SOC, Menlo Security Platform, unintended security gaps, Menlo iSOC, reskilling, cybersecurity skills gap

Shifting Security to the Cloud

Posted by Mehul Patel on Oct 13, 2020

Build a Security Approach that Is Integrated, Simple, and Cloud Delivered

Last month I had the absolute pleasure of chatting with Kenny Yeo, a cybersecurity analyst from Frost and Sullivan and one of the leading security experts in the Asia Pacific region. Kenny and I locked horns during a conference recently, and we started sharing notes on how SaaS security has evolved. It turned into quite an interesting conversation, so I wanted to get his take on recent network and security shifts that are impacting companies.

 

Read More

Tags: cybersecurity, security, web isolation, Cloud Adoption, cloud security, cloud-delivered security, digital transformation and security, Frost and Sullivan

Ensure DLP Protection and Visibility for Remote Workers

Posted by Mehul Patel on Jul 28, 2020

Secure Remote Worker Use Case 4: Data Loss Prevention and Visibility

Today’s workers have been flung to the far reaches of the Internet, forcing them to log in and gain access to critical business applications and data in the cloud from unsecured residential and public Internet connections. Understandably, this lack of control and visibility is keeping cybersecurity professionals up at night, wondering whether data is being exposed on the edge of this new network architecture.

Read More

Tags: cybersecurity, security, Cloud DLP, SWG, VPN, split tunneling, data loss prevention, data visibility, remote application access

Open Access to the Internet with Protection

Posted by Mehul Patel on Jul 21, 2020

Secure Remote Worker Use Case 3:
URL Filtering, SaaS Access Control, and Visibility

A cloud-based secure web gateway (SWG) gives cybersecurity teams complete visibility and control over traffic that bypasses the VPN. Consider these two use cases.

Read More

Tags: malware, phishing, security, spear-phishing, DLP, cloud-delivered security, visibility and control, URL filtering, VPN, SaaS access, remote users, acceptable use policies

Security and Visibility When Users Are Not in the Office

Posted by Mehul Patel on Jul 14, 2020

Secure Remote Worker Use Case 2: Security and Visibility of Data and Traffic

As we now accept the new norm, combating malicious cyberthreats comes down to two things: visibility and control. If you can monitor traffic flowing to and from users’ devices and control how that traffic behaves and is secured, a malicious actor would be hard pressed to infiltrate your network and do harm.

Read More

Tags: phishing, security, HTTS, HTTPS, SSL Inspection, DLP, cloud-delivered security, visibility and control, security policies, URL filtering, VPN, secure web gateway

Mitigating Threats Associated with Downloading Files in Native File Format

Posted by Mehul Patel on Jul 10, 2020

File-based threats are occurring with greater frequency and higher success rates as threat actors have continued to hone and adapt their social engineering and spearphishing skills to fit today’s trends, such as cloud transformation. Consider that hundreds of millions of users are now working remotely and relying on Software as a Service (SaaS) platforms and rich web apps to improve mobility and productivity.

Read More

Tags: isolation, security, SaaS, internet access, cloud-delivered security, remote access, CDR, Content Reconstruction

Menlo Security Thwarts Covid-19–Related Phishing Attacks

Posted by Mehul Patel on Jun 24, 2020

Threat actors can be ruthless. They use social engineering to comb through people’s personal and professional lives to uncover details that they can use in spearphishing campaigns to manipulate users into unwittingly downloading malware or giving up their credentials

 

Read More

Tags: phishing, isolation, security, Isolation Core, Cloud Proxy, Secure Remote Worker, Remote Working, SaaS, internet access, cloud-delivered security

Going Phishing During Tax Season

Posted by Jay Kelley on Mar 15, 2017

 

You’ve probably heard about businesses that have fallen victim to successful spear-phishing attacks leading to the theft of employee W-2s. But, the IRS began warning tax professionals in January they are under attack, too!

Read More

Tags: phishing, security, credential theft, financial services, spear-phishing

10 Tips to Avoid Malware Threats & Mitigate Attacks

Posted by Kowsik Guruswamy on Mar 6, 2017



Half of the web is vulnerable to malware attacks, as we measured recently in our State of the Web research report, making it clear that merely visiting a legitimate web site is risky.

Read More

Tags: malware, cybersecurity, phishing, isolation, security, ransomware, credential theft, malware vulnerabilities, cyber theft, security strategy, anti-phishing, cyber threats, Google Chrome, bitcoins

Looking Back at an Incredible 2016

Posted by Peter Lunk on Jan 23, 2017
Read More

Tags: malware, isolation, security, gateway, global managed security service, channel partner

Connect with us

Lists by Topic

see all

Recent Posts