Secure Remote Worker Use Case 3:
URL Filtering, SaaS Access Control, and Visibility
A cloud-based secure web gateway (SWG) gives cybersecurity teams complete visibility and control over traffic that bypasses the VPN. Consider these two use cases.
Read More
Tags:
malware,
phishing,
security,
spear-phishing,
DLP,
cloud-delivered security,
visibility and control,
URL filtering,
VPN,
SaaS access,
remote users,
acceptable use policies
Regardless of the political fall-out from Special Counsel Robert J. Mueller’s indictment of twelve Russian intelligence operatives for tampering with the 2016 U.S. Presidential election, this much seems clear after reading the 29-page, John LeCarre-like document: It has become unreasonable to expect any organization to successfully defend against such a massive, coordinated cyberattack.
Read More
Tags:
malware,
phishing,
isolation,
credential theft,
spear-phishing,
remote browsing,
cyberattacks,
browser isolation,
presidential election,
Russian hackers,
Russian operatives,
Russian intelligence,
DNC,
DCCC,
Podesta,
cryptojacking,
X-Agent,
Mueller,
U.S. election,
GRU,
Clinton Campaign,
Democratic National Committee,
Democratic Congressional Campaign Committee,
Clinton,
cryptocurrency
While this post is intended to be a little tongue-in-cheek for readers, it’s been written to provoke discussion on how organizations continue to do the same things they have done for the last 15 years, without thinking of all the issues they bring with them…
Read More
Tags:
phishing,
isolation,
ransomware,
spear-phishing,
web isolation,
malvertising
If you are in the financial services community, you are likely well-aware of and well-acquainted with SWIFT and the services it performs. As a quick primer for the uninitiated, SWIFT is an acronym for the Society for Worldwide Interbank Financial Telecommunication, a cooperative built over forty years ago by banks and financial institutions globally to address a mutual problem: A better, more secure, and automated way to communicate inter-bank payments across borders. SWIFT addressed this common issue, and today, it is a world-leading provider of secure messaging services for over 11,000 banks, financial organizations, and enterprises in over 200 countries.
Read More
Tags:
malware,
phishing,
spear-phishing,
cyber attacks,
isolation technology,
isolation platform,
SWIFT
Spear phishing attacks continue to plague businesses of all sizes, across all sectors. Detection of these messages remains an impossible feat. Spear phishing messages plague everyone and their intent ranges from delivering malware or ransomware, to stealing passwords and personal information, such as bank account information. All of these things have a high value in the online criminal world, hence why spear phishing is the most popular tool in the cyber attack arsenal today.
Read More
Tags:
ransomware,
anti-phishing,
spear-phishing,
cyber attacks,
cyber training,
cyber security
The financial services industry is consistently among the most highly targeted industries for cyberattacks. Financial services institutions (FSIs) are a popular and frequent focus of attackers because, to quote famed bank robber Willie Sutton, when asked why he robbed banks: “That’s where the money’s at.”
Read More
Tags:
malware,
phishing,
isolation,
ransomware,
credential theft,
drive-by exploits,
phishing prevention,
spear-phishing,
watering hole attacks,
phishing attacks,
financial services industry,
cyberattacks,
banking credentials,
keyloggers,
employee credential theft
If you find it challenging to prioritize which security innovations to implement this year, this latest Gartner report can help. It names Menlo Security as a 2017 Cool Vendor for Security for Mid-Size Enterprise, and explains how any resource-constrained IT team can use browser isolation to reduce exposure to malware and phishing attacks.
Read More
Tags:
cybersecurity,
isolation,
browser,
gartner,
anti-phishing,
spear-phishing,
remote browsing,
browser-based attacks,
cyber attacks,
email threats
Recent news is all about election hacking, with the publication this week by The Intercept of a top-secret report from the U.S. National Security Agency (NSA), detailing how Russian military intelligence or state-sponsored attackers – or, maybe as Russian President Vladimir Putin stated in a recent interview, “patriotically minded” private Russian hackers – launched a multi-pronged phishing and spearphishing attack on voter registration during the 2016 U.S. presidential elections.
Read More
Tags:
cybersecurity,
isolation,
anti-phishing,
spear-phishing,
cyber attacks,
infosec euope
It’s 2017, and many organisations are still grappling with solving two of the biggest routes of attack into their business from the Internet - via their employees' in-boxes and web browsers.
Read More
Tags:
cybersecurity,
isolation,
credential theft,
anti-phishing,
spear-phishing,
cyber attacks,
infosec euope
Over 350,000 of the world’s top 1 million web sites may be running vulnerable software -- which the recent WannaCry cyber attack has shown can spell considerable risk of hacker exploitation. According to the Menlo Security State of The Web report, software on some web sites dates back to over a decade ago, as far back as the year 2000. The cyber security research reveals that nearly half (46%) of the Internet’s top 1 million web sites, as ranked by Alexa, are risky, and that 1 in 5 domains run vulnerable software.
Read More
Tags:
isolation,
ransomware,
credential theft,
malware vulnerabilities,
phishing prevention,
spear-phishing,
banks,
cyber attacks,
wannacry,
hackers,
financial security firms,
credit unions,
web threats,
email threats