Joe CISOVirtual Browser Security — Is WDAG The Answer?Microsoft’s WDAG offering brought virtual browser security to Windows 10 — but can it secure your organization against web-based threats?Dec 5, 2018Dec 5, 2018
Joe CISOInternet Surfing Separation: Effective Security or Draconian Constraint?Singapore is famous for many things, including its status as a “smart nation”. But in 2016, the government began to cut internet access…Nov 26, 2018Nov 26, 2018
Joe CISOCatching all Threats — Known, Unknown, and Unknown Unknown — Before They Can Harm YouIn a world of limitless threats, true security lies in proactively isolating even unknowable risks where they can do no harmOct 31, 2018Oct 31, 2018
Joe CISOVirtual Computing as a Security SolutionOn the security benefits of combining virtual computing, browser-based access & remote browser isolationOct 24, 2018Oct 24, 2018
Joe CISOSo Long and (No) Thanks For All the PhishYou’re probably familiar with phishing, a common form of social engineering fraud in which a scammer tries to gain the trust of his or her…Sep 25, 2018Sep 25, 2018
Joe CISOGandCrab — The Ransomware That Won’t Give UpRansomware got you feeling a bit, well, crabby?Sep 6, 2018Sep 6, 2018
Joe CISOPandora’s Sandbox: Why Sandboxes Are Powerless Against Browser-Borne ThreatsSandboxes were once a state-of-the-art cybersecurity toolbut browser-borne threats are leaving them in the dust…May 3, 2018May 3, 2018
Joe CISOEmotet — The Polymorph Strikes BackWhat is truly striking about the return of Emotet is its advanced polymorphism — the ability to change itself dynamically to avoid…Apr 12, 2018Apr 12, 2018
Joe CISO5 Steps Towards a More Holistic View of Endpoint SecurityManage and secure your endpoints by adopting smart, preventive security measuresMar 4, 2018Mar 4, 2018