Internet Isolation
Zero Trust for Federal Agencies
Mehul Patel | | federal cybersecurity, government digital transformation, Internet Isolation, Isolation, new normal, next-gen secure web gateway, zero trust
Internet Isolation Enables a Zero Trust Approach That Protects Remote Users from Cybersecurity Threats without Impacting the User Experience. Federal agencies are being forced to rethink the way they empower public servants ...
Chrome Gets Patched Again—But 83% of Users Aren’t Running the Latest Version
Mehul Patel | | Cloud Security, CVE-2020-15999, CVE-2020-16009, CVE-2020-16013, CVE-2020-16017, Cybersecurity, Google Chrome, Internet Isolation, web browser, zero-days
Isolation Provides Malware-Free Browsing Regardless of Patch Status Imagine your life today without being able to freely browse the web. Browsers have put the entire world on our devices and in the ...
Menlo Security Prevents Zero-Day Threat on Internet Explorer
James Locus | | Active-Threat, CVE-2020-1380, ie, Internet Explorer, Internet Isolation, isolaton, Malware, zero-day attack
The Still-Active Zero-Day Exploit Threatens the Frequently Vulnerable JavaScript Engine Customers of Menlo Security using Internet Explorer (IE) are protected against a recent and still-active zero-day exploit using Internet Explorer, as outlined ...
IE and FIREFOX-Patching nightmare begins in 2020…
Not all vulnerabilities are created equal. It’s true. In a perfect world, organizations should be able to patch every vulnerability on every client immediately. But we don’t live in a perfect world ...
Evaluating Internet Isolation Clouds: Must-Have Features
Not all Internet isolation solutions are created equal. Just ask our customers. One of them learned the hard way ...
Isolation protects you from threats that haven’t even been discovered
Another day, another validation that Internet isolation really is the best cybersecurity protection out there.Last week, Google released an urgent Chrome update to patch an actively exploited zero-day known as CVE-2019-13720, a ...
Preparing for the New Regulatory Environment
Mehul Patel | | browser isolation, guide, Internet Isolation, Web security, zerotrust, ZeroTrust Internet
It started as a phishing expedition and ended up being the largest data breach in the history of Singapore. It was June 2018. The FIFA World Cup was in full swing, Jurassic ...
Hiding in Plain Sight: New Adwind jRAT Variant Uses Normal Java Commands to Mask its Behavior
Street magicians have a secret: If you want to hide something, hide it in plain sight. It’s how hidden card tricks, sleight of hand and most illusions work. Unfortunately, malicious actors are ...
Internet Isolation: Exploring Use Cases
You understand the technology and how it is engineered. Now let’s talk about how Internet isolation works in the real world. Once implemented, how does it protect users from specific cyberthreats that ...
Reimagining Cloud Access
Let’s face it. Everything we do today is on the Internet. We communicate through webmail. We collaborate through project management platforms. We share documents in shared storage accounts. We keep track of ...

