Internet Isolation: Exploring Use Cases

You understand the technology and how it is engineered. Now let’s talk about how Internet isolation works in the real world. Once implemented, how does it protect users from specific cyberthreats that ...

Reimagining Cloud Access

Let’s face it. Everything we do today is on the Internet. We communicate through webmail. We collaborate through project management platforms. We share documents in shared storage accounts. We keep track of ...

Why ANY Web Browser Is Still Not Safe…

Menlo Security customers are 100% protected against a recent zero-day exploit in Internet Explorer. The exploit CVE-2019-1367 and CVE-2019-1255 is being actively used in limited attacks ...
Digging Deeper Into Isolation

Digging Deeper Into Isolation

We get it. You’re a bit leery. One hundred percent protection from web- and email-based attacks? With no impact on user experience or web browsing performance? No clients to install? No software ...

Internet Isolation Cloud: Introducing a New Paradigm

The fact that Albert Einstein never really said, “The definition of insanity is doing the same thing over and over again and expecting a different result,” doesn’t mean it isn’t genius. Think ...

Understanding How the Internet Has Changed

It’s not your father’s Internet anymore. Heck, it’s not even your older sister’s Internet anymore. The Internet of AOL, Internet Explorer, and static web pages is gone. In its place is a ...

Getting to Know Today’s Threats

Threat actors aren’t stupid. Really, they’re not. They know that the best way into an organization’s network is through users. People are the weakest link in any cybersecurity strategy. Why spend countless ...

Cat and Mouse: Understanding the Security Industry’s Failure to Stop Cyberattackers

Have you ever watched a cat stalk its prey? First, it identifies a target and lies in wait, quietly, hidden from view, observing the behavior of its victim. Minutes can go by ...
Loading...