Get the Report: CISO Recommendations for Endpoint Security by Security Current

New Security Current report compiles advice and recommendations for endpoint security solutions from 13 CISOs across a variety of industries Hear why CISOs recommend application isolation for endpoint security protection See the value application isola… Continue reading Get the Report: CISO Recommendations for Endpoint Security by Security Current

Browser Isolation with Microsoft Windows Defender Application Guard (WDAG): What It Does, How It Works and What It Means

Microsoft brings hardware isolation to the web browser Bromium and Microsoft have similar approaches to browser isolation using virtualization Microsoft protects only their own OS and proprietary Microsoft applications Bromium works with all Microsoft … Continue reading Browser Isolation with Microsoft Windows Defender Application Guard (WDAG): What It Does, How It Works and What It Means

Phishing Trojan Campaign Picks Up Pace, Morphing at Scale to Defeat Legacy Detection

Phishing attacks are nothing new, but we are noticing a new trend for polymorphism, both in the wrapping document and in the dropped executable. In samples that are literally minutes old, we see the control server is re-obfuscating and updating the malware faster than anti-virus programs are updating their awareness. The changes made are more […]

The post Phishing Trojan Campaign Picks Up Pace, Morphing at Scale to Defeat Legacy Detection appeared first on Bromium.

The post Phishing Trojan Campaign Picks Up Pace, Morphing at Scale to Defeat Legacy Detection appeared first on Security Boulevard.

Continue reading Phishing Trojan Campaign Picks Up Pace, Morphing at Scale to Defeat Legacy Detection

Phishing Trojan Campaign Picks Up Pace, Morphing at Scale to Defeat Legacy Detection

Phishing attacks are nothing new, but we are noticing a new trend for polymorphism, both in the wrapping document and in the dropped executable. In samples that are literally minutes old, we see the control server is re-obfuscating and updating the malware faster than anti-virus programs are updating their awareness. The changes made are more […]

The post Phishing Trojan Campaign Picks Up Pace, Morphing at Scale to Defeat Legacy Detection appeared first on Bromium.

The post Phishing Trojan Campaign Picks Up Pace, Morphing at Scale to Defeat Legacy Detection appeared first on Security Boulevard.

Continue reading Phishing Trojan Campaign Picks Up Pace, Morphing at Scale to Defeat Legacy Detection

A Fresh Approach to Perimeter Protection: Application Isolation

Detection-based IT security solutions have never worked, and will never work. More security layers is not the answer, but smarter layers can work. Shift your mindset from “prevent, detect, and respond” to “isolate, contain, and control.” Layer after layer of security is not stopping breaches. We can’t keep the bad guys out. Oddly enough, 80+ years […]

The post A Fresh Approach to Perimeter Protection: Application Isolation appeared first on Bromium.

The post A Fresh Approach to Perimeter Protection: Application Isolation appeared first on Security Boulevard.

Continue reading A Fresh Approach to Perimeter Protection: Application Isolation