2021 Threat Landscape
What to Look for in the New Year I have good news and bad news. The good news is that the most difficult year in recent memory is almost over. By my count, we have less than 20 days to go, and that’s clearly not enough time for the murder ... Read More
Update on DoD’s Cloud-Based Internet Isolation
I’m very proud of what we do at Menlo Security. We work very hard to make sure organizations and users around the world can safely access the tools and information they need to keep businesses running. We prevent confidential data from falling into the wrong hands. We protect users’ most ... Read More
Five Cloud Security Considerations for CISOs
Discover How You Can Protect Users and the Organization in Today’s New Normal The past six months have been a whirlwind of change. Security teams across the world have scrambled to empower distributed users with the tools and information they need to keep businesses running. Now everyone is accessing everything ... Read More
Providing 100 Percent Malware-free Email and Web Browsing
How a Fortune 500 Customer Embraced Menlo’s Isolation as Their Primary Defense Against Phishing and Email Threats. I had the opportunity to chat with one of our largest customers the other day. I can’t mention the company name, but they are a big, well-known brand. Menlo works with eight of ... Read More
The Critical Role of SSL Inspection to Avoid Secure Malware Delivery
If you think the little green lock of https equals security, think again. The bad news is that the bad guys use encryption too. Many people mistakenly assume that as long as an SSL certificate is present, they’re safe from attack, but that couldn’t be further from the truth. From ... Read More
How to Mitigate Phishing Threats inYour Organization
From a bad actor perspective, phishing is the cheapest and easiest way to infiltrate organizations and personal informationto make a profit. By nature, humans are curious and are oft en overconfident when it comes to security. Phishing is an even greater threat for mobile users, too. Without key visual cues, ... Read More
Why Outsmart Cyber Attackers When You Can Remove Them Entirely?
Cyber threat actors have gotten smarter--or lazier--depending on your perspective. It used to be fairlycommon for attackers to spend days or even weeks probing targeted networks for vulnerabilities toexploit. Once identified, they would break down traditional cybersecurity defenses around the networkperimeter and steal as much information as they could, or ... Read More