Zero Trust for Federal Agencies

Internet Isolation Enables a Zero Trust Approach That Protects Remote Users from Cybersecurity Threats without Impacting the User Experience. Federal agencies are being forced to rethink the way they empower public servants ...

It’s Time to Address the Growing Cybersecurity Skills Gap

Cybersecurity warriors are in short supply these days. According to (ISC)2, 2.8 million professionals work in cybersecurity globally, but the industry would need another 4 million trained workers—500,000 in the U.S. alone—in ...

Menlo Threat Labs Uncovers a Phishing Attack Using Captchas

| | CAPTCHA, Isolation, Phishing
Menlo Security’s iSOC—our isolation-powered SOC service—identified a credential phishing campaign targeting the hospitality industry. Menlo Labs researchers decided to take a deeper dive into the campaign and I’m glad we did, because ...

Phishing Attacks Are Scarily Easy to Build

Targeting People, Not the Infrastructure Historically, many cyberattacks tended to be technology-focused and required specialized knowledge to expertly fool a network into believing the attacker was an authorized user. Spoofing, man-in-the-middle (LAN ...

How Should Zero Trust Apply to Phishing?

Isolation for Zero Trust Phishing Protection Phishing sites frequently evade web and email filters because of the inability of secure gateways to detect new phishing websites or categorize them properly. According to ...

How to Safely Access Sensitive Data From Home – Part 2

| | Isolation
Our last blog provided an introduction to technologies controlling and protecting employee internet access in the modern enterprise. We also discussed the classic ways internet access is being protected. Make sure to ...

How to Safely Access Sensitive Data From Home – Part 2

| | Isolation
Our last blog provided an introduction to technologies controlling and protecting employee internet access in the modern enterprise. We also discussed the classic ways internet access is being protected. Make sure to ...

How Isolation Changes Incident Response

Large Groups of Isolated Users Shrink Your Exposure Surface Enterprises frequently acquire an isolation solution (with Menlo for remote browser isolation) for groups of users, such as VIPs, rather than their entire ...

How to Safely Access Sensitive Data From Home – Part 1

| | Isolation
In the new era of working-from-home learning to protect your sensitive data from the dangers of the internet is a challenge the majority of IT teams are facing today. You don’t have ...

How to Safely Access Sensitive Data From Home – Part 1

| | Isolation
In the new era of working-from-home learning to protect your sensitive data from the dangers of the internet is a challenge the majority of IT teams are facing today. You don’t have ...