ActiveX Data Leaks: Making Bad (Non-) Browsers Worse

ActiveX Data Leaks: Making Bad (Non-) Browsers Worse

ActiveX, in combination with locally installed browsers and plugins, still poses a potent threat for enterprise cybersecurity. An overview ...
Showdown: VPN vs. Cloud Browser

Showdown: VPN vs. Cloud Browser

In many companies, VPN has become a staple of the traditional IT security stack. Annually, mid-sized organizations (<5,000 employees) spend an average of $60 per user on VPN technology and maintenance. Not ...
85% of Infected Websites Are NOT Blacklisted

85% of Infected Websites Are NOT Blacklisted

Website attacks increased by 59% in 2018, according to the 2019 Website Security Report [PDF] recently published by Scottsdale, AZ-based SiteLock, a provider of business website security solutions. Most of the attacks ...
Cloud Browser Economics 101

Cloud Browser Economics 101

"Free" browsers drive up IT security expenses in the enterprise. This itemized comparison shows how organizations using the Silo Cloud Browser save, vs. the traditional security approach with locally installed browsers ...
Browser Security: The Worst Code Injections and How They Work

Browser Security: The Worst Code Injections and How They Work

What do browser-based attacks have in common? They target locally installed browsers through malicious code injects ...
Webinar: Cloud-based Research Platform for Threat Hunters

Webinar: Cloud-based Research Platform for Threat Hunters

Webinar: Authentic8 and Recorded Future are presenting a cloud-based research platform for threat hunters ...
Financial Services: How to Minimize Vendor Risk Online in One Step

Financial Services: How to Minimize Vendor Risk Online in One Step

Here’s a quick tip for CISOs and compliance officers in banks, credit unions, investment or wealth management firms who worry about cybersecurity threats that emanate from vendors and third-party apps: Disconnect from ...
How Watering Hole Attacks Target the Financial Sector and Government Agencies

How Watering Hole Attacks Target the Financial Sector and Government Agencies

Websites of governments, regulatory bodies and financial authorities are preferred targets for "watering hole" attacks on finance, investment and compliance professionals. These online resources make it easy for attackers to target their ...
Browser Security: What's Up with WASM?

Browser Security: What’s Up with WASM?

WebAssembly, a newer type of “low-level” code that can be run by modern web browsers, is aimed at improving the web experience. The catch: Regular browsers execute such code locally. WebAssembly - ...
5 Must-read Resources for SOC and Threat Intelligence Professionals

5 Must-read Resources for SOC and Threat Intelligence Professionals

| | Remote Browser, security
How to equip and staff your Security Operations Center? We review five must-read resources for CISOs, SOC and threat intelligence professionals who are planning a SOC or budgeting for an existing one ...
Loading...