Busting the myth: Secure Web Gateways offer web browser threat visibility
Browsers are now the most used enterprise application today. But popularity comes with a giant target. According to the Verizon 2022 Data Breach Investigation Report (DBIR), web applications and email – which are primarily accessed via web browsers – constitute the primary attack vectors in security breaches, accounting for over ... Read More
5 keys to effective web browser visibility
Users are trusting by nature. They assume that if they are able to access a site or application on the Internet, it must be safe. If it wasn’t, the conventional wisdom goes, IT would simply block the malicious content. Unfortunately, we know that is not the case. Today’s cyberattacks use ... Read More
Escalating evasive browser attacks: Understanding the whys
Cybersecurity is a perpetual challenge of strategy and adaptation. Threat actors find a vulnerability, and, eventually, security vendors plug the hole. Attackers find another way into the network, and a patch is issued to seal that weakness as well. And so on and so forth. It’s this back and forth ... Read More
Is AI revolutionizing cybersecurity? The answer isn’t as clear.
Peruse last quarter’s press releases from top cybersecurity vendors, and it’s hard to miss the focus on artificial intelligence (AI) and machine learning (ML). According to these vendors, traditional security tools are getting boosted by advanced algorithms that can analyze large amounts of event and behavioral data to trigger automated ... Read More
The opportunities and risks of ChatGPT in cybersecurity
A lot of ink has been spilled over the past several months about the impact generative artificial intelligence (AI) platforms and chatbots like ChatGPT will have on cybersecurity. Many people, rightly so, are nervous that the tools will allow anyone with an Internet connection and a malicious motive to develop ... Read More
The difference between Highly Evasive Adaptive Threats (HEAT) and advanced persistent threats (APT)
In the fast-paced world of enterprise security, the last two years have seen a whirlwind of change unlike any other. The rise of remote work, cloud migration, and Software-as-a-Service (SaaS) applications has revolutionized the way we do business, but it has also opened up a Pandora’s box of security vulnerabilities ... Read More
Eliminating SOC fatigue in today’s distributed, hybrid workplace
In a word, today’s threat landscape is relentless. According to Check Point Research, cyberattacks reported globally in 2022 increased by 38% compared to 2021—reaching an all-time high in Q4 of 1168 weekly attacks per organization. This includes increasingly sophisticated ransomware, drive-by attacks, phishing and Highly Evasive Adaptive Threats (HEAT) that ... Read More
The Top HEAT Attacks of 2022
Hackers are getting smarter, and the number of cyberthreats is only going to rise in 2023. With the number of new threats individuals and organizations are seeing on a daily basis, cybersecurity experts are growing weary. As a majority of these attacks begin to surpass traditional security systems, historically complacent ... Read More
Avoid these cybersecurity pitfalls to protect remote workers in 2023
Digital transformation. Exploding threat surfaces. Work from home. Hybrid work. Software as a Service (SaaS). Cloud migrations. Secure Remote Access. Private tunnels. SD-WAN. Ransomware. Phishing. Social engineering. Drive-by attacks. Credential theft. BYOD. Self-service IT. The list goes on and on. Securing remote workers has never been so complex or fraught ... Read More
Remote browser isolation (RBI) myths debunked
Have you heard that implementing isolation technology — while still enhancing your security stance — would impact your end users? A small minority of cybersecurity experts, analysts, and even some vendors have been saying that remote browser isolation (RBI) solutions are not a critical component of the enterprise security stack ... Read More