Menlo Security Named a Visionary in Gartner’s MQ for Secure Web Gateways Three Years in a Row

We believe the report validates customer migration from on-premises to the cloud and security functions’ convergence into a SWG platform architecture.
Gartner’s 2020 Magic Quadrant for Secure Web Gateways (SWG) is now live, and Menlo Security has … Continue reading Menlo Security Named a Visionary in Gartner’s MQ for Secure Web Gateways Three Years in a Row

Honorably Serving Our Veterans Wherever the Mission Goes

The VA Has an Opportunity to Rethink Its Cybersecurity Posture in the New Normal with Cloud Web Isolation.
Covid-19 and its impact have pushed federal workers out from behind the firewall to the edge of the network in home offices. Fortunately, th… Continue reading Honorably Serving Our Veterans Wherever the Mission Goes

Safeguarding Our Health Information in a Global Pandemic

HHS Can Use Cloud Web Isolation to Stop Cybersecurity Threats without Impacting Productivity.
The U.S. Department of Health and Human Services (HHS) has been on the front lines of the Covid-19 pandemic, working with other federal departments to co… Continue reading Safeguarding Our Health Information in a Global Pandemic

New Gartner Report Sheds Light on Digital Transformation Strategies in a Postpandemic World

Government Agencies Need to Rethink How They Provide Fast and Reliable—Yet Secure—Access to Remote Users.
Covid-19 and the resulting fallout has laid bare the inefficiencies of government and a failure to address these issues with existing digital… Continue reading New Gartner Report Sheds Light on Digital Transformation Strategies in a Postpandemic World

Use the Dark Web to Enhance your Investigations – Learn How [Training Course]

The Dark Web offers a wealth of information to help advance research. See how you can use the Dark Web to enhance your investigations.
The post Use the Dark Web to Enhance your Investigations – Learn How [Training Course] appeared first on Securi… Continue reading Use the Dark Web to Enhance your Investigations – Learn How [Training Course]

SEGs Haven’t Stopping Phishing, So Email Isolation is Next, Hold On

Users of a Secure Email Gateway (SEG) are protected from most phishing, yet emails with malicious URLs still get through. To address the issue, SEG vendors have added isolation technologies to their security stacks. It is often marketed as email isolat… Continue reading SEGs Haven’t Stopping Phishing, So Email Isolation is Next, Hold On

NSA warning on location data exposure: your web browser is a liability

The National Security Agency issued a warning that exposed location data from mobile devices can pose a security risk for government personnel.
The post NSA warning on location data exposure: your web browser is a liability appeared first on Security B… Continue reading NSA warning on location data exposure: your web browser is a liability

NSA warning on location data exposure: your web browser is a liability

The National Security Agency issued a warning that exposed location data from mobile devices can pose a security risk for government personnel.
The post NSA warning on location data exposure: your web browser is a liability appeared first on Security B… Continue reading NSA warning on location data exposure: your web browser is a liability

How to Use Pastebin for Cyber Threat Intelligence Research

A short tutorial by Authentic8 researchers shows how you can use information found on Pastebin to locate individuals who are offering leaked or stolen data.
The post How to Use Pastebin for Cyber Threat Intelligence Research appeared first on Security … Continue reading How to Use Pastebin for Cyber Threat Intelligence Research