March | Traceable AI Feature Release

March | Traceable AI Feature Release

Stay current with new developments from Traceable AI; including, local hosting for EU/Asia and support for agentless deployments. The post March | Traceable AI Feature Release appeared first on Traceable App & API Security ... Read More
February | Traceable AI Feature Release

February | Traceable AI Feature Release

Stay current with new developments from Traceable AI; including, new support for AWS Lambda serverless architecture and new privacy features for managing sensitive data. The post February | Traceable AI Feature Release appeared first on Traceable App & API Security ... Read More

Connectivity Counts: Why Smaller FSIs Worry about Secure, Remote Access

Nimble but Smaller FSIs Adapt to Change Quickly, but Have Fewer Resources  Not every financial service institution (FSI) is the size of a global bank with hundreds of thousands of workers. Frequently, boutique investment firms, insurance providers, and regional or local banks have only a fraction of the workers of their ... Read More

Financial Institutions Care about Fast Deployments

FSIs Are Under Siege Large financial services institutions (FSIs) supporting thousands of workers have had to accelerate their plans for remote working since March 2020.   In our conversations with FSIs during that period, various themes have emerged that tell a story of an industry at war on multiple fronts ... Read More

Phishing Attacks Are Scarily Easy to Build

Targeting People, Not the Infrastructure Historically, many cyberattacks tended to be technology-focused and required specialized knowledge to expertly fool a network into believing the attacker was an authorized user. Spoofing, man-in-the-middle (LAN or Wi-Fi), DNS, and other attacks require actual skill (and a bit of malice) to properly execute ... Read More

How Should Zero Trust Apply to Phishing?

Isolation for Zero Trust Phishing Protection Phishing sites frequently evade web and email filters because of the inability of secure gateways to detect new phishing websites or categorize them properly. According to Menlo Labs, web and email gateways wrongly categorize 10-15 percent of malicious websites as safe ... Read More

How Isolation Changes Incident Response

Large Groups of Isolated Users Shrink Your Exposure Surface Enterprises frequently acquire an isolation solution (with Menlo for remote browser isolation) for groups of users, such as VIPs, rather than their entire workforce. While this strategy insulates VIPs from malware attacks, it assumes that only VIPs have access to potentially ... Read More

The URL “Danger Zone”

Inadequate Security Policies with Uncategorized Sites The challenge most email gateways face is how to protect against URL-based threats that exist within a “danger zone”— the period when phishing sites are allowed to sneak into the network as uncategorized sites.   ... Read More

Menlo Security Prevents Zero-Day Threat on Internet Explorer

The Still-Active Zero-Day Exploit Threatens the Frequently Vulnerable JavaScript Engine Customers of Menlo Security using Internet Explorer (IE) are protected against a recent and still-active zero-day exploit using Internet Explorer, as outlined by Microsoft’s security update CVE-2020-1380 ... Read More

Multi-Stage Phishing Attacks Are Dangerous

Threat actors rely on a mix of tactics that take advantage of a user’s lack of attention to draw them into interactions designed to hide malicious intent ... Read More