Zero Trust for Federal Agencies

Internet Isolation Enables a Zero Trust Approach That Protects Remote Users from Cybersecurity Threats without Impacting the User Experience. Federal agencies are being forced to rethink the way they empower public servants with the tools and information they need to make government work. Even before the Covid-19 global pandemic, agencies ... Read More

Chrome Gets Patched Again—But 83% of Users Aren’t Running the Latest Version

Isolation Provides Malware-Free Browsing Regardless of Patch Status Imagine your life today without being able to freely browse the web. Browsers have put the entire world on our devices and in the palm of our hand—easily searchable in a powerful and seamless experience. This is where work happens, in browsers, ... Read More

Combat Alert Fatigue

Improve Productivity of Your SOC Personnel Through Menlo iSOC I get it—it’s been a hard year for the cybersecurity industry. Covid-19 pushed users from a safe, central, hardened data center out to the edge of the network—literally overnight. We’ve been forced to scramble to enable secure application access to these ... Read More

Solving FinTech’s Top 4 Security Anxieties

Two FSI Experts Talk About What Keeps Them Up at Night The thing about anxieties is that everyone has them. There’s not a person alive who isn’t afraid or worried. Whether it’s spiders or public speaking or nuclear war, something likely keeps us up at night. Cybersecurity is the same ... Read More

Honorably Serving Our Veterans Wherever the Mission Goes

The VA Has an Opportunity to Rethink Its Cybersecurity Posture in the New Normal with Cloud Web Isolation. Covid-19 and its impact have pushed federal workers out from behind the firewall to the edge of the network in home offices. Fortunately, the Department of Veterans Affairs had already embarked on ... Read More

Protect Your Employees from Business Email Compromise Attacks

Menlo Imposter Threat Detection Flags Payloadless Attacks that Impersonate Senior Executives and Other VIPs Cyberattacks aren’t always delivered via a payload such as a link to a malicious URL or an infected file attachment. Rather than trick users into downloading malicious content, attacks without payloads—otherwise known as imposter threats—use fake ... Read More

Safeguarding Our Health Information in a Global Pandemic

HHS Can Use Cloud Web Isolation to Stop Cybersecurity Threats without Impacting Productivity. The U.S. Department of Health and Human Services (HHS) has been on the front lines of the Covid-19 pandemic, working with other federal departments to coordinate national policy and responses to address the public health crisis. However, ... Read More

New Gartner Report Sheds Light on Digital Transformation Strategies in a Postpandemic World

Government Agencies Need to Rethink How They Provide Fast and Reliable—Yet Secure—Access to Remote Users. Covid-19 and the resulting fallout has laid bare the inefficiencies of government and a failure to address these issues with existing digital transformation initiatives, according to a new report published by Gartner. These inefficiencies, the ... Read More

It’s Time to Address the Growing Cybersecurity Skills Gap

Cybersecurity warriors are in short supply these days. According to (ISC)2, 2.8 million professionals work in cybersecurity globally, but the industry would need another 4 million trained workers—500,000 in the U.S. alone—in order to properly defend organizations and close the skills gap ... Read More

Shifting Security to the Cloud

Build a Security Approach that Is Integrated, Simple, and Cloud Delivered Last month I had the absolute pleasure of chatting with Kenny Yeo, a cybersecurity analyst from Frost and Sullivan and one of the leading security experts in the Asia Pacific region. Kenny and I locked horns during a conference ... Read More