The Social Engineering Behind Operation Sharpshooter, Rising Sun

We are learning more about Operation Sharpshooter, an espionage campaign that targeted financial services, government and critical infrastructure primarily focused in German, Turkey, the UK and the US.  It is important to show how easily this atta… Continue reading The Social Engineering Behind Operation Sharpshooter, Rising Sun

Application Isolation in the Spotlight

Two major announcements bring application isolation into the spotlight Microsoft and HP elevate the importance of isolation in the endpoint security stack Isolate risky browser activity, but don’t forget files are risky too This week, two major a… Continue reading Application Isolation in the Spotlight

Securing Apps When User Devices Are Compromised

Corporate networks and user PCs continue to be exploited—leaving your sensitive applications and data vulnerable. Network segmentation is a fundamental way to mitigate the risks associated with these vulnerabilities—but it only works if aut… Continue reading Securing Apps When User Devices Are Compromised

A Fresh Approach to Perimeter Protection: Application Isolation

Detection-based IT security solutions have never worked, and will never work. More security layers is not the answer, but smarter layers can work. Shift your mindset from “prevent, detect, and respond” to “isolate, contain, and control.” Layer after layer of security is not stopping breaches. We can’t keep the bad guys out. Oddly enough, 80+ years […]

The post A Fresh Approach to Perimeter Protection: Application Isolation appeared first on Bromium.

The post A Fresh Approach to Perimeter Protection: Application Isolation appeared first on Security Boulevard.

Continue reading A Fresh Approach to Perimeter Protection: Application Isolation