The Hysolate Blog

  • The WhatsApp Hack

    By Marc Gaffan. May 16, 2019

    Could it be used to compromise your corporate environment? This week a vulnerability in the messaging app WhatsApp was reported that has allowed attackers to inject commercial spyware on to phones. WhatsApp, which is used by 1.5 billion people worldwide, discovered in early May that attackers were able to install surveillance software on to both […]

  • The Problem with VDI

    By Tal Zamir. March 27, 2019

    Anyone who’s been in enterprise IT long enough has already heard of, tested or deployed virtual desktop infrastructure (VDI). And why not? The promises made by VDI vendors have been compelling, if not always accurate: cost savings, enabling bring your own device (BYOD), improving the user experience and business continuity,  amongst others. However, there is […]

  • Protecting Against the Latest Windows DHCP Vulnerabilities

    By Aviram Shemesh. March 19, 2019

    Microsoft’s recent security patches, released on “Patch Tuesday,” reveal more vulnerabilities with Windows Dynamic Host Configuration Protocol (DHCP). Here’s what they imply and how Hysolate protects against them. Quick Summary: Of the 64 bugs squashed in Redmond’s March update, three caught our eyes: CVE-2019-0697, CVE-2019-0698, and CVE-2019-0726, all of which address holes in the DHCP […]

  • Privileged Access Workstation Survey…What it means to me

    By Jessica Stanford. March 13, 2019

    For a number of reasons, I’m pretty excited about the Privileged Access Workstation (PAW) Survey conducted by Cybersecurity Insiders. First – there seems to be a resounding agreement that IT admins need to use separate operating systems for sensitive and corporate activities. Nearly all respondents (94%) agree that IT admins are at increased risk of […]

  • Breaking VDI Security Myths

    By Tal Zamir. February 27, 2019

    CISOs and security professionals often refer to Virtual Desktop Infrastructure (VDI) and other “remote application” solutions as security barriers that hackers have a hard time bypassing. That’s a myth, and here’s why. Thin client scenarios are precarious.  These uses of VDI pose only a minor hurdle to determined cyber-criminals. An employee using a thin client […]

  • CyberTech 2019 – Our Take

    By Catherine Weldon. February 8, 2019

    It’s been a week since Cybertech 2019, and while the event made headlines for some of its famous speakers, most notably Benjamin Netanyahu, it held great importance for Hysolate for many more reasons. Our co-founder and CEO, Tal Zamir, had the opportunity to speak on a panel with fellow Team 8 co-founders Ofer Israeli, Illusive, […]

  • How to Stop Privileged Accounts From Being Compromised

    By Catherine Weldon. February 1, 2019

    In recent years, enterprises have started to become much more aware of the importance of IT hygiene for privileged accounts. With so many public cases of hackers gaining access to critical resources and causing insurmountable damage, it’s hard to escape the reality of today’s ever-increasing cyberattacks. One prominent example is the attack on the Ukrainian […]

  • 5 Reasons You Should Never Trust USB devices & the One Reason They All Don’t Matter

    By Jessica Stanford. January 21, 2019

    Go ahead – plug that USB device into your machine! Organizations – especially large enterprises – often have restrictions in place against using USBs. Their risks have been documented for years. This thread from 5 years ago talks about the risks of using USB over other media like CDs! The threats still prevail for USB […]

  • Hysolate Expands U.S. Presence

    By Catherine Weldon. October 1, 2018

    We’re excited to announce that Hysolate is growing our U.S. operations! We brought on a seasoned cybersecurity marketer, Jessica Stanford, to run global marketing, and are actively hiring for additional US-based sales roles. This is response to the huge need we’re seeing from CIOs and CISOs for solutions that improve end-user productivity while securing endpoints.They’re […]