HackDig : Dig high-quality web security articles for hacker

A Fresh Approach to Perimeter Protection: Application Isolation

Detection-based IT security solutions have never worked, and will never work. More security layers is not the answer, but smarter layers can work. Shift your mindset from “prevent, detect, and respond” to “isolate, contain, and control.” Layer after layer of security is not stopping breaches. We can’t keep the bad guys out. Oddly enough, 80+ years ago we l
Publish At:2017-11-07 13:06 | Read:65 | Comments:0 | Tags:Company News application isolation applications data segemen

Cybersecurity Breakthrough – The Perimeter is Shrinking – Free Webinar

Cybersecurity is changing as the perimeter has disappeared and computing has become ubiquitous. Targeting end users and end user computing is where cybercriminals focus because getting past end users is effective. With these changes, it’s safe to ask, what is the new perimeter? We have an answer. For years now, we’ve come to terms with the idea that
Publish At:2017-11-02 22:10 | Read:203 | Comments:0 | Tags:Company News

Cybersecurity Breakthrough – Application As Perimeter – Free Webinar

Cybersecurity is changing as the perimeter has disappeared and computing has become ubiquitous. Targeting end users and end user computing is where cybercriminals focus because getting past end users is effective. With these changes, it’s safe to ask, what is the new perimeter? We have an answer. For years now, we’ve come to terms with the idea that
Publish At:2017-10-30 17:15 | Read:112 | Comments:0 | Tags:Company News

Cybersecurity vs Productivity: The CISO’s Dilemma

Today organizations are struggling with the best way to protect against attacks that are targeting the endpoint. Too often, the security strategy has been to put the onus on the individual employee. Research has shown, over and over again, that training and user restrictions are both tedious and expensive, and have a very low success rate. This is because c
Publish At:2017-10-23 23:40 | Read:168 | Comments:0 | Tags:Company News CISO defense dilemma end users hackers infograp

Protecting Legacy Applications from Attacks with Modern Hardware Isolation

Legacy applications are integral to most businesses and are heavily relied upon in the public sector Many legacy applications were written in a time when security was much less of a concern than today Isolation is the only solution that can absolutely eliminate kernel-level exploits and malware escapes Detection is obsolete and the future of cybersecurity d
Publish At:2017-09-11 10:00 | Read:321 | Comments:0 | Tags:Company News detection Isolation legacy legacy apps Micro-VM

VMworld 2017 – Our Virtualization-Based Security Resonated with Architects, CISOs and Security-Minded Professionals

We were so happy to be in our element with folks who understand the inherent value in virtualization. From booth demos to our theater presentation on the Showcase stage to the private breakfast with The Godfathers of Virtualization, we received amazing feedback. We look forward to bringing our solution to your business – is it time for a meeting? VMworld i
Publish At:2017-09-05 12:15 | Read:309 | Comments:0 | Tags:Company News architect productivity Security Virtualization

The Godfathers of Virtualization Returning to VMWorld

Ian Pratt and Simon Crosby sold XenSource to Citrix in 2007. After working at Citrix, they decided to once again spin off and focus on cybersecurity. They are available to meet during VMWorld if you’d like to talk virtualization and security. We think of them as The Godfathers of Virtualization. They work they did with XenSource lead to what is today’s clo
Publish At:2017-08-15 17:35 | Read:420 | Comments:0 | Tags:Company News application isolation browsing click cybersecur

Turning Off Cybersecurity to Increase Productivity Shouldn’t Be How the Problem Gets Solved

It seems security teams are under a lot of pressure from the organization when it comes to the balance between productivity and staying secure. Our infographic below explains how this plays out: with some saying they turn off security and others modifying it. Cybersecurity shouldn’t be this hard and it shouldn’t impact end user behavior. Users s
Publish At:2017-07-24 23:15 | Read:422 | Comments:0 | Tags:Company News 2017 click cybersecurity infographic Infosecuri

Black Hat 2017 – Remember Our Name (and Our Booth; Our Booth is Really Cool)

We’ll be at Black Hat this year in booth #1216; come see us and make sure you sign-up for our free beta while you’re there. We’d love you to set up a meeting with our execs if you’re interested in how Bromium will work for your organization. If you Bring Your Own Malware and challenge our micro-VMs, at a minimum, you’ll get a s
Publish At:2017-07-18 04:15 | Read:351 | Comments:0 | Tags:Company News 2017 Beta Black Hat Black Hat 2017 byom demo ev

We Love HP, Inc.’s Newest Episode of “The Wolf” [Video]

Last February, we announced our relationship with HP, Inc. HP Sure Click provides secure browsing on selected HP business laptops. Sure Click delivers Bromium’s the first step in virtualization-based security for secure browsing. HP, Inc. is committed to keep their customers safe from cyber crime. They have invested in creating a laptop strategy that
Publish At:2017-07-05 18:30 | Read:490 | Comments:0 | Tags:Company News browsing Christian Slater cyber crime cybersecu

Our Bring Your Own Malware Challenge is Back!

We are hosting the Bring Your Own Malware Challenge at a series of upcoming events. Bring it to InfoSec in London, Gartner Security Summit in Maryland and of course, Black Hat in July. The rules are simple, you have to plan ahead, but we have a cash prize. That’s right. We’ll be hosting our BYOM aka Bring Your Own Malware Challenge once again, and it will
Publish At:2017-05-25 01:00 | Read:745 | Comments:0 | Tags:Company News Threats challenge endpoint infosec Isolation Ma

As Vendors Talk WannaCry, We Want You to Know What You Can Expect from Bromium

As WannaCry went nuts last week and everyone moved quickly to support one another; we all moved on our best intelligence at the time. Because most ransomware is typically delivered via email, website or file, we worked with our customers to make sure their endpoints were protected. One week later, I wanted to take a moment to be absolutely transparent about
Publish At:2017-05-20 10:20 | Read:826 | Comments:0 | Tags:Company News breach crypto-malware detection enterprise Isol

Security Professionals Admit to Paying Ransom and Hiding Breaches (Infographic)

We did a survey at RSAC in February that kind of blew our minds; so much so we surveyed more people to check our work! Security professionals admit to paying ransom (from ransomware) and not telling anyone what they’d done. When we went more broadly – U.S. and U.K. security pros – the numbers didn’t get better (they got worse). Have
Publish At:2017-05-13 12:35 | Read:779 | Comments:0 | Tags:Company News Threats breaches infographic Malware ransom Ran

The HP EliteBook is Shipping – You Are Free to Safely Browse the Internet

As we announced in February, HP Sure Click begins shipping on the new HP EliteBook x360 starting today. This beauty not only has a secure BIOS but also offers secure browsing – security built-in, not bolted-on. With this launch, virtualization-based security goes completely mainstream, direct to the prosumer. We are so pleased to share the news that
Publish At:2017-04-18 20:30 | Read:778 | Comments:0 | Tags:Company News End Users browsing Chrome Edge EliteBook x360 H

Virtualization-Based Security…Bromium 4.0 Takes Isolation Mainstream

We’ve been working hard to get ready for the long anticipated launch of Bromium Secure Platform 4.0. Many of our customers, 35 to be exact, have already had the opportunity to test the release candidates and give feedback. Register now for the upcoming webinar on April 27 to learn more about what’s in the new release of Bromium Secure Platform. Virtualizat
Publish At:2017-04-16 13:05 | Read:607 | Comments:0 | Tags:Company News 4.0 attacks blacklisting blocking Bromium Secur

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud