SANS 2019 Incident Response Survey: Successful IR Relies on Visibility

During the past year, we have witnessed significant data breaches that have impacted industries ranging from hospitality to legal to social media. We have seen a continuation of financially motivated threats, such as business email compromise (BEC), wh… Continue reading SANS 2019 Incident Response Survey: Successful IR Relies on Visibility

When Encryption isn’t ‘Safe’ Enough

Being on the hook for free services to friends and family members is a well-known risk for many professionals. Doctors get called in the middle of the night to see sick nieces and nephews, attorneys advise their siblings on traffic violations and airli… Continue reading When Encryption isn’t ‘Safe’ Enough

Revolutionize Endpoint Security with Application Isolation & Containment

US Defense Information Systems Agency (DISA) security experts are evaluating how organizations can better protect their endpoints from existing and Zero-Day threats with two endpoint security capabilities: Endpoint Detection and Response (EDR) and Appl… Continue reading Revolutionize Endpoint Security with Application Isolation & Containment

How to use Bromium Application Isolation to Secure Microsoft Edge Downloads

Microsoft Edge browser does not isolate web file downloads Learn how to use Bromium to isolate your Microsoft Edge web file downloads Bromium works with all Microsoft virtualization-based security (VBS) technologies Microsoft jumps on the application i… Continue reading How to use Bromium Application Isolation to Secure Microsoft Edge Downloads