It’s Time for Federal Agencies to Stop Malware for Good

Cybersecurity teams at federal agencies all face the same challenge: How do you protect against emerging threats when the agency work environment keeps evolving?   ...

Zero Trust: Guilty Until Proven Innocent

Zero Trust Powered by Isolation is the only Way to Secure Work. I had a great opportunity to chat with Tom Field of Information Security Media Group (ISMG) last month about Zero ...

Zero Trust for Federal Agencies

Internet Isolation Enables a Zero Trust Approach That Protects Remote Users from Cybersecurity Threats without Impacting the User Experience. Federal agencies are being forced to rethink the way they empower public servants ...

Chrome Gets Patched Again—But 83% of Users Aren’t Running the Latest Version

Isolation Provides Malware-Free Browsing Regardless of Patch Status Imagine your life today without being able to freely browse the web. Browsers have put the entire world on our devices and in the ...

Menlo Security Prevents Zero-Day Threat on Internet Explorer

The Still-Active Zero-Day Exploit Threatens the Frequently Vulnerable JavaScript Engine Customers of Menlo Security using Internet Explorer (IE) are protected against a recent and still-active zero-day exploit using Internet Explorer, as outlined ...

IE and FIREFOX-Patching nightmare begins in 2020…

Not all vulnerabilities are created equal. It’s true. In a perfect world, organizations should be able to patch every vulnerability on every client immediately. But we don’t live in a perfect world ...

Evaluating Internet Isolation Clouds: Must-Have Features

Not all Internet isolation solutions are created equal. Just ask our customers. One of them learned the hard way ...

Isolation protects you from threats that haven’t even been discovered

Another day, another validation that Internet isolation really is the best cybersecurity protection out there.Last week, Google released an urgent Chrome update to patch an actively exploited zero-day known as CVE-2019-13720, a ...

Preparing for the New Regulatory Environment

It started as a phishing expedition and ended up being the largest data breach in the history of Singapore. It was June 2018. The FIFA World Cup was in full swing, Jurassic ...

Hiding in Plain Sight: New Adwind jRAT Variant Uses Normal Java Commands to Mask its Behavior

Street magicians have a secret: If you want to hide something, hide it in plain sight. It’s how hidden card tricks, sleight of hand and most illusions work. Unfortunately, malicious actors are ...