Ron Gula – Innovation and Emerging Trends in Cybersecurity

TechSpective Podcast Episode 065 Cybersecurity is constantly evolving. The threat landscape continues to expand and new technologies shift and extend the attack surface–both of which require new and innovative tools and practices to address. Ron Gula, … Continue reading Ron Gula – Innovation and Emerging Trends in Cybersecurity

SEGs Haven’t Stopping Phishing, So Email Isolation is Next, Hold On

Users of a Secure Email Gateway (SEG) are protected from most phishing, yet emails with malicious URLs still get through. To address the issue, SEG vendors have added isolation technologies to their security stacks. It is often marketed as email isolat… Continue reading SEGs Haven’t Stopping Phishing, So Email Isolation is Next, Hold On

Public Sector Ransomware Attacks Rage On: Can Your Organization Repel Them?

To pay or not to pay continues to be the question as ransomware targets cities, even amid COVID-19. Continue reading Public Sector Ransomware Attacks Rage On: Can Your Organization Repel Them?

Social Distancing and Isolation—A Good Idea for You and Your Browser

Just as physical isolation helps keep us virus free in the age of COVID-19, browser isolation does the same thing for your laptop or mobile device. The basics of the technology are that another computer is placed between you and the big bad Intern… Continue reading Social Distancing and Isolation—A Good Idea for You and Your Browser

3 Strategies for Better Security and Compliance

If you’ve ever rowed a boat with someone else, you know that it’s very difficult to make progress if two people are rowing in different directions. Imagine if you could add a third rower trying to pull you off in another direction entirely. According … Continue reading 3 Strategies for Better Security and Compliance

Preparing for the New Regulatory Environment

It started as a phishing expedition and ended up being the largest data breach in the history of Singapore. It was June 2018. The FIFA World Cup was in full swing, Jurassic World hit theaters worldwide, and a low-level administrator with SingHealt… Continue reading Preparing for the New Regulatory Environment

Bromium Secure Browsing Isolates Intelligently and Maximizes Browser Choice

Web browsing is intensely personal, even at work. Users develop strong preferences, tend to lock in a browser early, and are fiercely loyal to their favored choice. Forcing them to change browsers—or even strongly suggesting it—is often met… Continue reading Bromium Secure Browsing Isolates Intelligently and Maximizes Browser Choice

Browser Isolation Eliminates Risk in Context

Browser isolation: Secure, user-centric browsing isolates phishing links, plus high-risk and lightly-trafficked websites Context awareness preserves native browsing for low-risk websites and trusted online enterprise resources Browser isolation fully q… Continue reading Browser Isolation Eliminates Risk in Context

Google Chrome shifts browser architecture to thwart Spectre attacks

Google Chrome is enabling a new security feature called Site Isolation in response to the set of speculative execution side-channel attacks known as Spectre and Meltdown. One day after a new Spectre-like attack was disclosed, the newly enabled Site Isolation feature attempts to provide what Google’s security team believes is “the most effective mitigation” possible. This is the latest improvement for Chrome, widely considered to possess the best security features among different browsers. Spectre and Meltdown use the speculative execution feature of a machine’s processors to access memory that is supposed to be off-limits to users. Site Isolation aims to keep data in the same process so that a Spectre attack can’t siphon off important data. The security feature is available in the current version (Chrome 67) of Chrome on Windows, Mac, Linux and Chrome OS. The Chrome team is now working on extending the coverage to Android. The team […]

The post Google Chrome shifts browser architecture to thwart Spectre attacks appeared first on Cyberscoop.

Continue reading Google Chrome shifts browser architecture to thwart Spectre attacks

How to use Bromium Application Isolation to Secure Microsoft Edge Downloads

Microsoft Edge browser does not isolate web file downloads Learn how to use Bromium to isolate your Microsoft Edge web file downloads Bromium works with all Microsoft virtualization-based security (VBS) technologies Microsoft jumps on the application i… Continue reading How to use Bromium Application Isolation to Secure Microsoft Edge Downloads