Articles, trends, and advice on cloud security without compromise. Keep up with the latest blog insights on web isolation, network cybersecurity, malware, and more.

Why ANY Web Browser Is Still Not Safe

Posted by Vinay Pidathala on Sep 25, 2019

Menlo Security customers are 100 percent protected against a recent zero-day exploits in Internet Explorer. The exploits CVE-2019-1367 and CVE-2019-1255 are being actively used in limited attacks.

Read More

Tags: vulnerability, browser-based attacks, Web Security, Internet Isolation, CVE

Menlo Security Collaborates with Fujitsu on Global Managed Security Service

Posted by Peter Lunk on May 26, 2016

I am extremely pleased to report that we have entered into a partnership with Fujitsu, providing  an enhancement to their Global Managed Security Service. The Menlo Security Isolation Platform (MSIP) will be used to bolster the Risk Reduction capabilities of the managed service offering to automatically eliminate the risk of malware from Web, documents and email.

This partnership expands the market reach for the Menlo Security Isolation Platform (MSIP) as we make this breakthrough security solution available as a cloud software service to the Fujitsu GMSS installed base. 

Read More

Tags: malware, vulnerability, isolation, security, webinar, top-sites, global managed security service

Security That's Imperceptible - Gartner's Take on Choosing the Right Isolation Provider

Posted by Peter Lunk on May 23, 2016

With Web and email continuing as primary malware vectors, companies are increasingly adopting isolation technology to contain and prevent risky content. However, Gartner points out that an isolation solution must deliver a high-quality end user experience to keep up with enterprise productivity needs.

This Menlo Security webinar, featuring Gartner, recommends you ensure your isolation technology solution provides a positive user experience, especially full fidelity and rich media support. If a solution reduces performance, your employees will find a way to work around your security measures, defeating your entire purpose of eliminating malware. 

Read More

Tags: malware, vulnerability, isolation, security, webinar, top-sites

Don't Forget About Prevention: Gartner's Views on Security Strategy

Posted by Peter Lunk on Mar 30, 2016

With hundreds of security companies offering a diverse and innovative set of solutions, prioritizing your security efforts is getting harder all the time. Presenting the most important strategies in a visual model is even harder, and thankfully we can count on the folks at Gartner to put a lot of horsepower behind creating something simple yet compelling and actionable.

Where I find Gartner’s Adaptive Security Architecture to be especially relevant, in terms of handling today’s emerging digital enterprise behaviors, is that it brings threat prevention back to the forefront. The Gartner architecture takes the broad universe of possible security approaches and distills them down into four general categories: predictive, preventive, detection and response capabilities. To lower IT risk, their model describes a continuous response approach instead of an incident response method – developing comprehensive protection by integrating predictive, preventive, detection and response capabilities.

Read More

Tags: malware, vulnerability, isolation, security, webinar, top-sites

March Madness, With Or Without The Malware?

Posted by Kowsik Guruswamy on Mar 23, 2016

If you are not familiar with March Madness, it's the single-elimination basketball tournament played each spring in the United States, currently featuring 68 college teams. It's one of THE most famous sporting events in the United States. As we head into the Sweet Sixteen bracket, we thought it might be prudent to analyze the Top 10 sports sites in the U.S. based on the Alexa ranking. These sites are the most visited around this time with sports fan checking out the bracket to see if their favorite team is advancing to the next stage. The real question is, can these sites be a prime target for malware and ransomware?

Read More

Tags: malware, vulnerability, top-sites

State of the Web 2015: Vulnerability Report

Posted by Kowsik Guruswamy on Mar 23, 2015

In February, security researchers reported had been hacked. As a result, any visitor to the site was infected – without clicking on any links. This incident was just the latest reminder that seemingly safe activities on the Web – like browsing the home page of a well known and trusted site like – is risky. With over one billion websites on the Internet, and more than 100,000 new sites coming online daily, we found ourselves wondering: Can we quantify the level of risk on the Web?

Read More

Tags: vulnerability, cybersecurity, web, report

Gist of Today's OpenSSL Security Advisory

Posted by Kowsik Guruswamy on Mar 19, 2015

In case you didn't see it, the OpenSSL team announced an advisory for multiple security vulnerabilities today. The advisory contains 14 vulnerabilities of which two are rated high.

Read More

Tags: advisory, vulnerability, ssl, openssl

Connect with us

Lists by Topic

see all

Recent Posts