illustration of SWG in cloud under a gate

Busting the myth: Secure Web Gateways offer web browser threat visibility

Browsers are now the most used enterprise application today. But popularity comes with a giant target. According to the Verizon 2022 Data Breach Investigation Report (DBIR), web applications and email – which are primarily accessed via web browsers – constitute the primary attack vectors in security breaches, accounting for over ... Read More
illustration of protected laptop computer and cellphone

5 keys to effective web browser visibility

Users are trusting by nature. They assume that if they are able to access a site or application on the Internet, it must be safe. If it wasn’t, the conventional wisdom goes, IT would simply block the malicious content. Unfortunately, we know that is not the case. Today’s cyberattacks use ... Read More
illustration of web browser with warning symbol

Escalating evasive browser attacks: Understanding the whys

Cybersecurity is a perpetual challenge of strategy and adaptation. Threat actors find a vulnerability, and, eventually, security vendors plug the hole. Attackers find another way into the network, and a patch is issued to seal that weakness as well. And so on and so forth. It’s this back and forth ... Read More
illustration of android person with laptop computer

Is AI revolutionizing cybersecurity? The answer isn’t as clear.

Peruse last quarter’s press releases from top cybersecurity vendors, and it’s hard to miss the focus on artificial intelligence (AI) and machine learning (ML). According to these vendors, traditional security tools are getting boosted by advanced algorithms that can analyze large amounts of event and behavioral data to trigger automated ... Read More
Illustration of robot stealing files from computer

The opportunities and risks of ChatGPT in cybersecurity

A lot of ink has been spilled over the past several months about the impact generative artificial intelligence (AI) platforms and chatbots like ChatGPT will have on cybersecurity. Many people, rightly so, are nervous that the tools will allow anyone with an Internet connection and a malicious motive to develop ... Read More
DarkReading HEAT Interview

The difference between Highly Evasive Adaptive Threats (HEAT) and advanced persistent threats (APT)

In the fast-paced world of enterprise security, the last two years have seen a whirlwind of change unlike any other. The rise of remote work, cloud migration, and Software-as-a-Service (SaaS) applications has revolutionized the way we do business, but it has also opened up a Pandora’s box of security vulnerabilities ... Read More
Illustration of tired man sitting in front of SOC, servers

Eliminating SOC fatigue in today’s distributed, hybrid workplace

In a word, today’s threat landscape is relentless. According to Check Point Research, cyberattacks reported globally in 2022 increased by 38% compared to 2021—reaching an all-time high in Q4 of 1168 weekly attacks per organization. This includes increasingly sophisticated ransomware, drive-by attacks, phishing and Highly Evasive Adaptive Threats (HEAT) that ... Read More

The Top HEAT Attacks of 2022

Hackers are getting smarter, and the number of cyberthreats is only going to rise in 2023. With the number of new threats individuals and organizations are seeing on a daily basis, cybersecurity experts are growing weary. As a majority of these attacks begin to surpass traditional security systems, historically complacent ... Read More
Security Boulevard
Illustration of people using laptops while surrounded by holes in the ground

Avoid these cybersecurity pitfalls to protect remote workers in 2023

Digital transformation. Exploding threat surfaces. Work from home. Hybrid work. Software as a Service (SaaS). Cloud migrations. Secure Remote Access. Private tunnels. SD-WAN. Ransomware. Phishing. Social engineering. Drive-by attacks. Credential theft. BYOD. Self-service IT. The list goes on and on. Securing remote workers has never been so complex or fraught ... Read More
A remote worker on a laptop using web applications

Remote browser isolation (RBI) myths debunked

Have you heard that implementing isolation technology — while still enhancing your security stance — would impact your end users? A small minority of cybersecurity experts, analysts, and even some vendors have been saying that remote browser isolation (RBI) solutions are not a critical component of the enterprise security stack ... Read More