How Web Isolation Is Setting the Stage for a New, Future-ready Approach to Security.
Imagine you’re an Olympic sprinter. The starting gun is about to go off when race officials announce a late change. You’ll need to hop a zig-zag pattern on one foot while still maintaining your original two-foot qualifying speed—or face a DQ.
Read More
Tags:
web isolation,
Web Security,
Secure Remote Worker,
Remote Work,
digital transformation,
ACR technology
With the surge in remote working and widespread adoption of Software as a Service (SaaS) platforms, security needs to be re-architected to better address modern-day threats. Apps and users have shifted from on-premises appliances to the cloud, and security infrastructure needs to adapt accordingly to keep pace.
Read More
Tags:
Web Security,
SASE,
CASB,
cloud security,
secure web gateway,
SOC,
ZTNA,
SaaS security,
APAC,
Asia Pacific
Discover How You Can Protect Users and the Organization in Today’s New Normal
The past six months have been a whirlwind of change. Security teams across the world have scrambled to empower distributed users with the tools and information they need to keep businesses running. Now everyone is accessing everything from everywhere, with limited control and visibility into who is accessing what, where, and on what device.
Read More
Tags:
cybersecurity,
phishing,
spearphishing,
cyberattacks,
Web Security,
HTTPS,
SaaS,
cloud security,
VPN,
email security,
new normal,
cloud apps,
BYOD
Today we announced security without compromise. Menlo Security is offering a warranty of up to $1 million to any customer that experiences an infection from malware that passes through our Isolation Core™. This warranty is the first of its kind from a cloud proxy company, a category that includes some very large, public companies who have thousands of customers.
Read More
Tags:
Web Security,
Isolation Core,
Cloud Proxy,
Anti-Malware
The Emotet malware is a very destructive banking Trojan that was first identified in 2014. Over the years it has evolved with new capabilities and functionalities, prompting cybersecurity agencies like the Australian Cyber Security Centre and US-CERT to issue advisories. Emotet malware generally spreads via malicious documents that drop a modular Trojan bot, which is used to download and install additional remote access tools. We wrote a blog post in January 2019 about how the malware had changed tactics, leading to a spike in the number of Emotet malware attacks. In the last week, we have observed a spike in the number of Emotet malware transactions across our customer base. US-CERT has also issued a fresh advisory regarding the recent spate of attacks.
Read More
Tags:
Web Security,
CVE,
emotet
Not all vulnerabilities are created equal. It’s true. In a perfect world, organizations should be able to patch every vulnerability on every client immediately. But we don’t live in a perfect world. Some vulnerabilities pose a much greater risk to the organization than others and should be prioritized.
Read More
Tags:
Web Security,
ZeroTrust,
Internet Isolation,
CVE
As warfare extends to cyberspace, U.S.-based organizations can use email and web isolation to protect users from common tactics used by Iranian-backed threat actors.
Read More
Tags:
phishing prevention,
Web Security,
ZeroTrust Internet,
CBII
As any office worker knows, browser tabs have a way of multiplying during the work day. Sure - it begins innocently enough flipping back between two news articles.
However, after a while, the tabs will have increased six-fold as the user inevitably gets distracted between YouTube, Spotify, and Salesforce. When done on a large scale, all those inactive tabs can eat up valuable network resources.
Read More
Tags:
Web Security,
Secure Web Access,
Bandwidth
Not all Internet isolation solutions are created equal. Just ask our customers. One of them learned the hard way.
Read More
Tags:
Web Security,
ZeroTrust,
ZeroTrust Internet,
Guide,,
Internet Isolation
Another day, another validation that Internet isolation really is the best cybersecurity protection out there.
Last week, Google released an urgent Chrome update to patch an actively exploited zero-day known as CVE-2019-13720, a memory corruption bug that uses a use-after-free vulnerability in audio that allows a threat actor to access memory after it has been freed. This allows anyone to cause a program to crash, execute arbitrary code, or even enable full remote code execution scenarios. Pretty serious stuff that should worry even the most secure enterprises.
Read More
Tags:
Web Security,
ZeroTrust,
Internet Isolation,
CVE