<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1626328370711236&amp;ev=PageView&amp;noscript=1">
banner-blog.jpg

blog

Massive Cyber Attack Threatens End Users, Again

Posted by Jay Kelley on Jun 28, 2017

Another week, another massive cyber attack hits the world. Since the Wikileaks share, powerful new hacking tools are readily available to anyone in the world. This will not be the last attack leveraging these newly available weapons.

Read More

Tags: cyber attacks, cybersecurity, cyber threats, ransomware, isolation, remote browsers, anti-phishing, security strategy, WannaCrypt, GoldenEye, bitcoin

10 Tips to Reduce Malware Threats

Posted by Kowsik Guruswamy on Mar 6, 2017



Half of the web is vulnerable to malware, as we measured recently in our State of the Web research report, making it clear that merely visiting a legitimate web site is risky.

Read More

Tags: malware, malware vulnerabilities, cybersecurity, cyber theft, cyber threats, ransomware, Google Chrome, security strategy, security, phishing, anti-phishing, bitcoins, credential theft, isolation

Menlo Security Rings in 2017 with Channel Partner Program

Posted by Doug Schultz on Jan 30, 2017
Read More

Tags: channel partner, malware, phishing, threats, security strategy, cybersecurity

Browsing the Web is a Leap into the Unknown

Posted by Kowsik Guruswamy on Dec 13, 2016

Users must recognize that they are taking a significant risk when connecting directly to the Internet. The new Menlo Security State of The Web report reveals that nearly half (46%) of the Internet’s top 1 million web sites, as ranked by Alexa, are risky.  

Read More

Tags: state of the web, security strategy, cybersecurity, isolation, cyber theft, anti-phishing, malware, malware vulnerabilities, blog

10 Reasons Why You Shouldn’t Consider Isolation!

Posted by Jason Steer on Nov 29, 2016

This is intended to be a little tongue in cheek for readers, however it’s been written to provoke discussion on how organizations continue to do the same things they have done for the last 15 years without thinking. 

Read More

Tags: anti-phishing, phishing prevention, malicious code, malware, isolation, cybersecurity, security, security strategy, ransomware, spear-phishing

Mass Downloads of Documents Still Include Malware

Posted by Greg Cross on Oct 14, 2016

A new and rapid growth trend during the U.S. political season is that various treasure troves of leaked documents now await  the masses on the Internet, including via sites like WikiLeaks and "Guccifer 2.0’s” latest Wordpress blog. 

Read More

Tags: malware, pdf, phishing, risk, cybersecurity, security, isolation, malicious code, malware vulnerabilities, email attachments, cyber theft, ransomware, security strategy

Connect with us

Lists by Topic

see all

Recent Posts

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.