EDR + Application Containment: Redefining the Modern Endpoint Security Stack

Despite record spending on cyber security, government agencies are not making significant headway in winning a battle against cybercrime. New white paper explores how threat-actors continues to be successful in bypassing layered defenses, highlights ke… Continue reading EDR + Application Containment: Redefining the Modern Endpoint Security Stack

Bromium Announces Capture the Flag BYOM Challenge

Bromium is announcing a Capture the Flag Bring Your Own Malware (BYOM) competition To win a $30,000 cash prize, you have to submit a sample of malware that successfully breaks out from our hardware-enforced containment and gains access to the flag file… Continue reading Bromium Announces Capture the Flag BYOM Challenge

How Virtualization Protects Your High-Value Assets [Webinar]

Networks and devices will keep getting compromised. You need a strategy to protect your most critical applications and assets. Bromium Protected App protects your high-value assets (HVAs) against compromised devices On October 23, 2018, analysts f… Continue reading How Virtualization Protects Your High-Value Assets [Webinar]

How Much Can Application Isolation Save Your Organization?

How many times a day do each of your users click on a link to an unknown website? Or open an email attachment from an external sender? Bromium’s new risk assessment calculator highlights the your costs savings associated with reducing risk by iso… Continue reading How Much Can Application Isolation Save Your Organization?

Hypervisor Security, Presentation by Ian Pratt

Bromium’s co-founder Ian Pratt delivered an insightful talk about hypervisors at Black Hat USA In his talk, Ian examines the evolution of hypervisor design, architecture, and technology over the years If you have missed Ian’s session at Bla… Continue reading Hypervisor Security, Presentation by Ian Pratt

Malware & Fileless Malware: How It’s Created, How It Spreads, and What To Do About It [On-Demand Webinar]

In this Dark Reading webinar, experts in cybersecurity share their views on what’s going on with malware, and how it evolves to outsmart even your most elaborate defenses Hear about the growing proliferation of “fileless malware” &#82… Continue reading Malware & Fileless Malware: How It’s Created, How It Spreads, and What To Do About It [On-Demand Webinar]

Why Cyber Defense Fails at Enterprise Scale and What You Can Do About It

Anti-malware solutions often fail to prevent cyber attacks on end-user applications at an enterprise level. Most endpoint detection platforms are reactive and time-sensitive, so enterprises do more damage control than preventing risk. Isolation and mic… Continue reading Why Cyber Defense Fails at Enterprise Scale and What You Can Do About It

Research Uncovers the Hidden Costs of Detection-based Cybersecurity [Infographic]

Our new research conducted by Vanson Bourne finds detect-to-protect security costs organizations more than $16 million per year. This is despite the fact that detection-based cybersecurity is failing to keep up with increasingly sophisticated malware. … Continue reading Research Uncovers the Hidden Costs of Detection-based Cybersecurity [Infographic]

Get the Report: CISO Recommendations for Endpoint Security by Security Current

New Security Current report compiles advice and recommendations for endpoint security solutions from 13 CISOs across a variety of industries Hear why CISOs recommend application isolation for endpoint security protection See the value application isola… Continue reading Get the Report: CISO Recommendations for Endpoint Security by Security Current