Mobile security: Getting to total mobile threat protection

It may come as a surprise to some organizations, but enterprise mobility management (EMM) does not equate to mobile security. Yes, EMM is considered the standard for mobile management, but EMM alone will not keep you or your mobile users and data … Continue reading Mobile security: Getting to total mobile threat protection

Hackers Keep it Simple: Malware Evades Detection by Simply Copying a File

New malware technique evades detection by simply copying a file We break it down step-by-step to show you how it works Innovative hackers continue to deliver sophisticated malware that evades detection The Bromium Lab is back to break down a recent out… Continue reading Hackers Keep it Simple: Malware Evades Detection by Simply Copying a File

Seasons Greetings? Not When That’s Malware In Your e-Card

Over Christmas, one of our customers was hit by a Trojan and they asked us to take a look at the threat. Sixteen of their users were fooled into opening a Word document. Fortunately, they had Bromium, so it safely ran inside a micro-VM and was unable t… Continue reading Seasons Greetings? Not When That’s Malware In Your e-Card

Malicious Phishing Protection Achieved with Bromium’s Application Isolation

Use Bromium to stop malicious phishing and safely open any shared web link from email or chat clients Eliminate restrictive IT security policies that limit user access to shared URLs Protect remote and roaming endpoints from malicious links when outsid… Continue reading Malicious Phishing Protection Achieved with Bromium’s Application Isolation

Malicious Phishing Protection Achieved with Bromium’s Application Isolation

Use Bromium to stop malicious phishing and safely open any shared web link from email or chat clients Eliminate restrictive IT security policies that limit user access to shared URLs Protect remote and roaming endpoints from malicious links when outsid… Continue reading Malicious Phishing Protection Achieved with Bromium’s Application Isolation

Signatures Not the Root of Prevention

Faulty file definitions strike once again! On April 24, anti-virus provider Webroot issued an automated update to its signature definitions. This inadvertently quarantined hundreds of critical customer files and applications that it erroneously flagged as malicious. At one time or another, it seems that every anti-malware endpoint security provider has fallen victim to the same […]

The post Signatures Not the Root of Prevention appeared first on Bromium.

Continue reading Signatures Not the Root of Prevention

Stop the Most Advanced Adversaries

Imagine that you are operating on an old XP, Win98 or Windows Server 2003 system. The system is out-of-support and vulnerable to a raft of possible exploits. However, it would be too disruptive to operations to update these systems since they’re running critical applications and processes. And even if you do upgrade to the latest […]… Read More

The post Stop the Most Advanced Adversaries appeared first on The State of Security.

Continue reading Stop the Most Advanced Adversaries

Stop the Most Advanced Adversaries

Imagine that you are operating on an old XP, Win98 or Windows Server 2003 system. The system is out-of-support and vulnerable to a raft of possible exploits. However, it would be too disruptive to operations to update these systems since they’re running critical applications and processes. And even if you do upgrade to the latest […]… Read More

The post Stop the Most Advanced Adversaries appeared first on The State of Security.

Continue reading Stop the Most Advanced Adversaries