Isolation
How to Safely Access Sensitive Data From Home – Part 1
In the new era of working-from-home learning to protect your sensitive data from the dangers of the internet is a challenge the majority of IT teams are facing today. You don’t have ...
Providing 100 Percent Malware-free Email and Web Browsing
How a Fortune 500 Customer Embraced Menlo’s Isolation as Their Primary Defense Against Phishing and Email Threats. I had the opportunity to chat with one of our largest customers the other day ...
Multi-Stage Phishing Attacks Are Dangerous
Threat actors rely on a mix of tactics that take advantage of a user’s lack of attention to draw them into interactions designed to hide malicious intent ...
Can container/docker benefits apply to client apps too?
You’ve probably heard about containers before. In the unlikely case that you missed the hype, but here’s a quick recap: containers are bundles of applications and their dependencies. With containers, it’s possible ...
Can container/docker benefits apply to client apps too?
You’ve probably heard about containers before. In the unlikely case that you missed the hype, but here’s a quick recap: containers are bundles of applications and their dependencies. With containers, it’s possible ...
Windows Containers 101
You’re probably familiar with the concept of containers – a piece of lightweight software that bundles an application and all its dependencies and configuration into a single package, that can be easily ...
Windows Containers 101
You’re probably familiar with the concept of containers – a piece of lightweight software that bundles an application and all its dependencies and configuration into a single package, that can be easily ...
Mitigating Threats Associated with Downloading Files in Native File Format
File-based threats are occurring with greater frequency and higher success rates as threat actors have continued to hone and adapt their social engineering and spearphishing skills to fit today’s trends, such as ...
Menlo Security Thwarts Covid-19–Related Phishing Attacks
Threat actors can be ruthless. They use social engineering to comb through people’s personal and professional lives to uncover details that they can use in spearphishing campaigns to manipulate users into unwittingly ...
Enforcing PCI DSS Compliance Requirements & OS Isolation
The Role of the Dedicated OS in Enforcing PCI DSS Privileged Access Requirements If your business handles credit cards, you know that malicious actors are gunning for the cardholder data your systems ...
