2021 Threat Landscape

What to Look for in the New Year I have good news and bad news. The good news is that the most difficult year in recent memory is almost over. By my count, we have less than 20 days to go, and that’s clearly not enough time for the murder ... Read More

Update on DoD’s Cloud-Based Internet Isolation

I’m very proud of what we do at Menlo Security. We work very hard to make sure organizations and users around the world can safely access the tools and information they need to keep businesses running. We prevent confidential data from falling into the wrong hands. We protect users’ most ... Read More

Five Cloud Security Considerations for CISOs

Discover How You Can Protect Users and the Organization in Today’s New Normal The past six months have been a whirlwind of change. Security teams across the world have scrambled to empower distributed users with the tools and information they need to keep businesses running. Now everyone is accessing everything ... Read More

Providing 100 Percent Malware-free Email and Web Browsing

How a Fortune 500 Customer Embraced Menlo’s Isolation as Their Primary Defense Against Phishing and Email Threats. I had the opportunity to chat with one of our largest customers the other day. I can’t mention the company name, but they are a big, well-known brand. Menlo works with eight of ... Read More

The Critical Role of SSL Inspection to Avoid Secure Malware Delivery

If you think the little green lock of https equals security, think again. The bad news is that the bad guys use encryption too. Many people mistakenly assume that as long as an SSL certificate is present, they’re safe from attack, but that couldn’t be further from the truth. From ... Read More

How to Mitigate Phishing Threats inYour Organization

From a bad actor perspective, phishing is the cheapest and easiest way to infiltrate organizations and personal informationto make a profit. By nature, humans are curious and are oft en overconfident when it comes to security. Phishing is an even greater threat for mobile users, too. Without key visual cues, ... Read More

Why Outsmart Cyber Attackers When You Can Remove Them Entirely?

Cyber threat actors have gotten smarter--or lazier--depending on your perspective. It used to be fairlycommon for attackers to spend days or even weeks probing targeted networks for vulnerabilities toexploit. Once identified, they would break down traditional cybersecurity defenses around the networkperimeter and steal as much information as they could, or ... Read More