It sounds like a nearly perfect cybersecurity solution: Intercept incoming data before it reaches the user’s web browser; isolate it in a secure sandbox; and send only the screen images—or pixels—to the browser. The ephemeral server is fully isolated from the organization’s IT assets and data, and its browser sessions are destroyed when the user…

ZeroFox provides an AI-powered platform that protects users and brands from social media-sourced threats. The platform analyzes millions of pieces of publicly-accessible content in platforms such as Microsoft 365, G Suite, LinkedIn, Facebook, Slack, Instagram, and Apple and Google mobile app stores — looking for potential threats such as account compromise, fraudulent profiles, business email…

Focus on Security Fundamentals One of the key fundamental approaches for security is to ensure your security team can identify, investigate and respond to threats. We recommend mining network data to help identify potential vulnerabilities and understand the nature of the cybersecurity threats that have emerged during the crisis. This can help offset increases in…

Avoiding Threat Management Rookie Mistakes

What do a Finnish HVAC company and an American car dealership have in common? Both have been doing a poor job running their computer systems and, as a result, both experienced embarrassing threat management blunders. Valtia is the property manager of two apartment buildings in the city of Lappeenranta in eastern Finland. Meanwhile, the car…