New Gartner Report Sheds Light on Digital Transformation Strategies in a Postpandemic World

Government Agencies Need to Rethink How They Provide Fast and Reliable—Yet Secure—Access to Remote Users. Covid-19 and the resulting fallout has laid bare the inefficiencies of government and a failure to address these issues with existing digital transformation initiatives, according to a new report published by Gartner. These inefficiencies, the ... Read More

It’s Time to Address the Growing Cybersecurity Skills Gap

Cybersecurity warriors are in short supply these days. According to (ISC)2, 2.8 million professionals work in cybersecurity globally, but the industry would need another 4 million trained workers—500,000 in the U.S. alone—in order to properly defend organizations and close the skills gap ... Read More

Shifting Security to the Cloud

Build a Security Approach that Is Integrated, Simple, and Cloud Delivered Last month I had the absolute pleasure of chatting with Kenny Yeo, a cybersecurity analyst from Frost and Sullivan and one of the leading security experts in the Asia Pacific region. Kenny and I locked horns during a conference ... Read More

Ensure DLP Protection and Visibility for Remote Workers

Today’s workers have been flung to the far reaches of the Internet, forcing them to log in and gain access to critical business applications and data in the cloud from unsecured residential and public Internet connections. Understandably, this lack of control and visibility is keeping cybersecurity professionals up at night, ... Read More

Open Access to the internet with Protection

Secure Remote Worker Use Case 3: URL Filtering, SaaS Access Control, and Visibility A cloud-based secure web gateway (SWG) gives cybersecurity teams complete visibility and control over traffic that bypasses the VPN. Consider these two use cases ... Read More

Security and Visibility When Users Are Not in the Office

Secure Remote Worker Use Case 2: Security and Visibility of Data and Traffic As we now accept the new norm, combating malicious cyberthreats comes down to two things: visibility and control. If you can monitor traffic flowing to and from users’ devices and control how that traffic behaves and is ... Read More

Mitigating Threats Associated with Downloading Files in Native File Format

File-based threats are occurring with greater frequency and higher success rates as threat actors have continued to hone and adapt their social engineering and spearphishing skills to fit today’s trends, such as cloud transformation. Consider that hundreds of millions of users are now working remotely and relying on Software as ... Read More

Fast User Access to SaaS for Users on Home Wi-Fi

Secure Remote Worker Use Case 1: Ensure Fast, Secure Access to SaaS Platforms Even before Covid-19 forced the adoption of work-from-home policies across the globe, the workforce had been getting more remote, more distributed, and more dependent on Software as a Service (SaaS) platforms. In turn, organizations have been looking ... Read More

Securing the New Normal: Future of Work

For most of us, working has always been social. We’d commute to an office every day where we’d spend our day in strategy meetings and whiteboard sessions, grab a coffee to catch up with colleagues, and catch the boss while walking the hall to provide the latest project update. Once ... Read More

Menlo Security Thwarts Covid-19–Related Phishing Attacks

Threat actors can be ruthless. They use social engineering to comb through people’s personal and professional lives to uncover details that they can use in spearphishing campaigns to manipulate users into unwittingly downloading malware or giving up their credentials ... Read More