<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1626328370711236&amp;ev=PageView&amp;noscript=1">
banner-blog.jpg

blog

Why Outsmart Cyber Attackers When You Can Remove Them Entirely?

Posted by Kowsik Guruswamy on Dec 5, 2019

Cyber threat actors have gotten smarter--or lazier--depending on your perspective. It used to be fairly
common for attackers to spend days or even weeks probing targeted networks for vulnerabilities to
exploit. Once identified, they would break down traditional cybersecurity defenses around the network
perimeter and steal as much information as they could, or cause as much chaos as possible, before the
hole was patched and they were shut out.

Today, threat actors are much more subtle. Instead of trying to break down the castle walls, they simply
steal the keys and stroll through the front door. By tricking users into willfully giving up their credentials
through spear phishing, threat actors can simply remain undetected for days, weeks or even months until
the time is right to execute their mission-- to extricate data, hold systems hostage, spy on users or all of
the above.

Is this lazy or creative? Depends on who you ask, maybe it’s a generational thing.

Read More

Tags: email threats, security breach, ZeroTrust Internet, Secure Web Access

Evaluating Internet Isolation Clouds: Must-Have Features

Posted by Mehul Patel on Nov 20, 2019

Not all Internet isolation solutions are created equal. Just ask our customers. One of them learned the hard way.

Read More

Tags: Web Security, ZeroTrust, ZeroTrust Internet, Guide,, Internet Isolation

Preparing for the New Regulatory Environment

Posted by Mehul Patel on Nov 6, 2019

It started as a phishing expedition and ended up being the largest data breach in the history of Singapore. It was June 2018. The FIFA World Cup was in full swing, Jurassic World hit theaters worldwide, and a low-level administrator with SingHealth, the country’s largest healthcare network, clicked on a seemingly innocent link in an email.

Read More

Tags: browser isolation, Web Security, ZeroTrust, ZeroTrust Internet, Guide,, Internet Isolation

Internet Isolation: Exploring Use Cases

Posted by Mehul Patel on Oct 23, 2019

You understand the technology and how it is engineered. Now let’s talk about how Internet isolation works in the real world. Once implemented, how does it protect users from specific cyberthreats that are common in today’s always-on, 24/7 world?

Read More

Tags: Web Security, ZeroTrust, ZeroTrust Internet, Guide,, Internet Isolation

Select the Right Strategy for Securing Web Access

Posted by Mehul Patel on Oct 16, 2019

Gartner: Deploy a Remote Browser Isolation Solution in Combination with Other Security Architecture Options for a Higher Level of Security.

Read More

Tags: Web Security, ZeroTrust Internet, Secure Web Access

Reimagining Cloud Access

Posted by Mehul Patel on Oct 9, 2019

Let’s face it. Everything we do today is on the Internet. We communicate through webmail. We collaborate through project management platforms. We share documents in shared storage accounts. We keep track of customers, keep an eye on inventory, and monitor fleets of trucks—all on the Internet.

Read More

Tags: Web Security, ZeroTrust, ZeroTrust Internet, Guide,, Internet Isolation

Menlo's Cloud Security Platform protects users from cryptomining attack

Posted by Vinay Pidathala on Oct 1, 2019

The Internet keeps getting weirder, and users are getting harder to protect. Yet Menlo Security continues to keep users safe.

Read More

Tags: cryptojacking, X-Agent, cryptocurrency, ZeroTrust Internet

Digging Deeper Into Isolation

Posted by Mehul Patel on Sep 25, 2019
  1. We get it. You’re a bit leery. One hundred percent protection from web- and email-based attacks? With no impact on user experience or web browsing performance? No clients to install? No software to manage and update?

Read More

Tags: Web Security, ZeroTrust, ZeroTrust Internet, Guide,, Internet Isolation

Internet Isolation Cloud: Introducing a New Paradigm

Posted by Mehul Patel on Sep 11, 2019

The fact that Albert Einstein never really said, “The definition of insanity is doing the same thing over and over again and expecting a different result,” doesn’t mean it isn’t genius. Think about it. People do this all the time. They keep repeating their mistakes and are surprised when they get the same results.

Read More

Tags: Web Security, ZeroTrust, ZeroTrust Internet, Guide,, Internet Isolation

Why a Cloud Transformation Must Include Multi-Tenant Isolation

Posted by Mehul Patel on Aug 29, 2019

People are moving to the cloud. The cloud permeates our day-to-day life, influencing everything from our family vacation photos to our most sensitive credit card data. Modern businesses are increasingly experiencing the same trend—the shift to cloud-based applications and workloads is occurring at an unprecedented rate. According to Forbes, the cloud will host 83 percent of enterprise workloads by 2020, a 10 percent increase over 2018.

Read More

Tags: Web Security, ZeroTrust, ZeroTrust Internet, Internet Isolation

Connect with us

Lists by Topic

see all

Recent Posts