banner-blog.jpg

BLOG

Menlo Security Prevents Zero-Day Threat on Internet Explorer

Posted by James Locus on Aug 12, 2020

The Still-Active Zero-Day Exploit Threatens the Frequently Vulnerable JavaScript Engine

Customers of Menlo Security using Internet Explorer (IE) are protected against a recent and still-active zero-day exploit using Internet Explorer, as outlined by Microsoft’s security update CVE-2020-1380.

Read More

Tags: malware, isolaton, Internet Isolation, Active-Threat, CVE-2020-1380, Zero-Day Attack, Internet Explorer, IE

Providing 100 Percent Malware-free Email and Web Browsing

Posted by Kowsik Guruswamy on Aug 11, 2020

How a Fortune 500 Customer Embraced Menlo’s Isolation as Their Primary Defense Against Phishing and Email Threats.

I had the opportunity to chat with one of our largest customers the other day. I can’t mention the company name, but they are a big, well-known brand. Menlo works with eight of the ten largest banks and four of the five biggest credit card companies in the world. Let’s just say it was one of them.

 

Read More

Tags: malware, cybersecurity, phishing, isolation, secure web gateway, financial services security, email security, global cloud proxy

Multi-Stage Phishing Attacks Are Dangerous

Posted by James Locus on Aug 6, 2020

Threat actors rely on a mix of tactics that take advantage of a user’s lack of attention to draw them into interactions designed to hide malicious intent.

Read More

Tags: phishing, isolation, email isolation, link isolation, link wrapping

Ensure DLP Protection and Visibility for Remote Workers

Posted by Mehul Patel on Jul 28, 2020

Secure Remote Worker Use Case 4: Data Loss Prevention and Visibility

Today’s workers have been flung to the far reaches of the Internet, forcing them to log in and gain access to critical business applications and data in the cloud from unsecured residential and public Internet connections. Understandably, this lack of control and visibility is keeping cybersecurity professionals up at night, wondering whether data is being exposed on the edge of this new network architecture.

Read More

Tags: cybersecurity, security, Cloud DLP, SWG, VPN, split tunneling, data loss prevention, data visibility, remote application access

Open Access to the Internet with Protection

Posted by Mehul Patel on Jul 21, 2020

Secure Remote Worker Use Case 3:
URL Filtering, SaaS Access Control, and Visibility

A cloud-based secure web gateway (SWG) gives cybersecurity teams complete visibility and control over traffic that bypasses the VPN. Consider these two use cases.

Read More

Tags: malware, phishing, security, spear-phishing, DLP, cloud-delivered security, visibility and control, URL filtering, VPN, SaaS access, remote users, acceptable use policies

Menlo Security Helps Organizations Build a Cybersecurity Strategy Based on ASD’s Essential Eight Recommendations

Posted by Andrew Wyte on Jul 15, 2020

Now, more than ever, the world is changing faster than people and companies can react. Organizations need help with keeping up to date on the cyberthreats to watch for, how attackers attempt to infiltrate the endpoint, and how to stop attacks in their tracks. Otherwise, cybersecurity is largely a patchwork of guesses, what-if scenarios, and crossed fingers.

Read More

Tags: malware, phishing, remote browser isolation, RB, active content security, ASD, essential eight, phishing, application patching, operating systems patching, macro security

Security and Visibility When Users Are Not in the Office

Posted by Mehul Patel on Jul 14, 2020

Secure Remote Worker Use Case 2: Security and Visibility of Data and Traffic

As we now accept the new norm, combating malicious cyberthreats comes down to two things: visibility and control. If you can monitor traffic flowing to and from users’ devices and control how that traffic behaves and is secured, a malicious actor would be hard pressed to infiltrate your network and do harm.

Read More

Tags: phishing, security, HTTS, HTTPS, SSL Inspection, DLP, cloud-delivered security, visibility and control, security policies, URL filtering, VPN, secure web gateway

Mitigating Threats Associated with Downloading Files in Native File Format

Posted by Mehul Patel on Jul 10, 2020

File-based threats are occurring with greater frequency and higher success rates as threat actors have continued to hone and adapt their social engineering and spearphishing skills to fit today’s trends, such as cloud transformation. Consider that hundreds of millions of users are now working remotely and relying on Software as a Service (SaaS) platforms and rich web apps to improve mobility and productivity.

Read More

Tags: isolation, security, SaaS, internet access, cloud-delivered security, remote access, CDR, Content Reconstruction

Fast User Access to SaaS for Users on Home Wi-Fi

Posted by Mehul Patel on Jul 9, 2020

Secure Remote Worker Use Case 1: Ensure Fast, Secure Access to SaaS Platforms

Even before Covid-19 forced the adoption of work-from-home policies across the globe, the workforce had been getting more remote, more distributed, and more dependent on Software as a Service (SaaS) platforms. In turn, organizations have been looking for a new way to protect these remote users from today’s increasingly sophisticated cyberattacks. Phishing attacks remain one of the biggest threats as malicious attackers take advantage of the new normal to trick users into downloading malware or giving up their credentials.

 

Read More

Tags: phishing, ransomware, anti-phishing, SWG, Secure Remote Worker, Working From Home, CASB, cloud-delivered security, Digital Workforce, Remote Work

Securing the New Normal: Future of Work

Posted by Mehul Patel on Jul 2, 2020

For most of us, working has always been social. We’d commute to an office every day where we’d spend our day in strategy meetings and whiteboard sessions, grab a coffee to catch up with colleagues, and catch the boss while walking the hall to provide the latest project update. Once in a while, if we had a personal appointment, a customer meeting across town, or an early-morning conference call from overseas, we’d be able to work from home, logging in from a VPN where we’d have secure access to productivity tools.

 

Read More

Tags: phishing, ransomware, anti-phishing, SWG, Secure Remote Worker, CASB, Digital Workforce, Remote Work

Connect with us

Lists by Topic

see all

Recent Posts