3 Desktop as a Service (DaaS) Security Risks

Desktop-as-a-Service (DaaS) has recently gained momentum with Microsoft making Windows Virtual Desktop (WVD) generally available and increasing its investment in this service. WVD basically lets companies host low-cost Windows desktops in the cloud, as… Continue reading 3 Desktop as a Service (DaaS) Security Risks

Hysolate workstations NOT impacted by new Windows CryptoAPI Spoofing Vulnerability

Summary Microsoft recently disclosed a spoofing vulnerability that enables an attacker to sign a malicious executable, making it appear that the file was from a trusted, legitimate source. It also enables attackers to conduct man-in-the-middle network … Continue reading Hysolate workstations NOT impacted by new Windows CryptoAPI Spoofing Vulnerability

Taking Zero Trust Network Access to The Next Level

What is Zero Trust? Zero trust is a security model based on maintaining strict access control. It has risen in popularity since Forrester coined the term in 2010.  Initially, Zero trust referred an enterprise security architecture that relied on a… Continue reading Taking Zero Trust Network Access to The Next Level

Win10: 3 Perspectives on Endpoint Security Strategies

Many businesses rely on corporate-owned Windows 10 devices for securing corporate endpoints. In an attempt to keep cyberattackers at bay, they may try to lock down Windows 10 with a variety of security features, such as Windows Defender (or a third-par… Continue reading Win10: 3 Perspectives on Endpoint Security Strategies

Have Your Cake and Eat It, Too: How Virtual Air Gap Solves Critical Digital Transformation Challenges

In the first part of this blog series, we presented three endpoint challenges enterprises must overcome in their digital transformation journeys: threat prevention, user productivity, and user privacy. In this second blog, we show how a radical new app… Continue reading Have Your Cake and Eat It, Too: How Virtual Air Gap Solves Critical Digital Transformation Challenges

Leveraging the Cyber “High Ground”: How to Win the Endpoint Battle

For over 2,000 years, people have leveraged elevated terrain, or “high ground,” to gain a strategic advantage over enemies and protect their realm. The Chinese “Art of War” suggests high ground as a strategic position that provi… Continue reading Leveraging the Cyber “High Ground”: How to Win the Endpoint Battle

The Hysolate Perspective: HP Acquires Bromium

From app sandboxing to OS isolation: How the endpoint is evolving   Last week, HP announced that it has acquired Bromium, maker of an app sandboxing product that uses virtual machines (VMs) to sandbox specific applications, such as browsers and of… Continue reading The Hysolate Perspective: HP Acquires Bromium