How to Protect Your Business from Ransomware

After a series of ransomware attacks hit cities last year, finally some good news: Las Vegas was able to stop a ransomware cyber-attack in its tracks. When the cyber-attack was detected, the ...
Automated Attacks on Web and Mobile Apps

How to Position the Enterprise for Zero Trust Success

“Zero Trust” may seem like a buzzword to some, but it’s a hot topic for a good reason. Most companies inevitably will adopt some form of the security strategy at some point, ...
Security Boulevard
Matthew Pascucci

Just Patch Already… It’s Not that Easy

We’ve all heard it before, “Just patch all the things and you’ll be perfectly fine” and there’s a lot of truth to this statement; it’s also extremely shortsighted. If you’re working in ...

Trustworthy Network Segmentation for an Untrustworthy World

Denial is not a strategy. The reality is that networks, PCs and XenApp clients are susceptible to attacks, if they haven’t been breached already. Network segmentation is an imperative. Organizations need to ...

Defense in Depth: 4 Essential Layers of ICS Security

Having been fortunate enough to work for a security company like Tripwire for a number of years, I’ve had the privilege to work with different teams in different verticals across the world ...

How Virtualization Protects Your High-Value Assets [Webinar]

Networks and devices will keep getting compromised. You need a strategy to protect your most critical applications and assets. Bromium Protected App protects your high-value assets (HVAs) against compromised devices On October ...

Securing Apps When User Devices Are Compromised

Corporate networks and user PCs continue to be exploited—leaving your sensitive applications and data vulnerable. Network segmentation is a fundamental way to mitigate the risks associated with these vulnerabilities—but it only works ...

Introducing Bromium Protected App®: Protect Critical Applications Against Compromised Devices

Protected App locks down access to and from your sensitive data, keeping it secure even if networks and host PCs have been compromised Using hardware-enforced virtualization-based security, Bromium Protected App protects against ...