The Workspace Isolation Blog

  • Improving Your Vulnerability Remediation Process

    By Ted Milewicz. July 7, 2020

    As security teams know all too well, data breaches are a fact of life. They’re also a huge thorn in the side of many companies. With the average data security breach costing $3.92 million worldwide and $8.19 million in the US, and resulting in untold damages to reputations and customers, it’s easy to see why. […]

  • How WFH is Changing Endpoint Security

    By Mariel Sable. June 30, 2020

    COVID-19 has changed the way we operate in our daily lives, to say the least. Everything from school and shopping, to finances, family life, and work, were overturned seemingly overnight. As with many crises, most of the world began COVID-19 in a state of denial—”it’s not really happening; it won’t impact us.” This quickly moved […]

  • Mythbusting Network Security Architecture Best Practices

    By Yan Aksenfeld. June 25, 2020

    Given the cyberattack surface area presented by networks, it’s little surprise that network security professionals try to adhere to network security architecture best practices. A network must have security embedded in its very design. However, while best practices like network segmentation and device hardening are wise and worth pursuing, they are becoming increasingly deficient. This […]

  • Security Concerns with an At-Home Workforce

    By Josh Hogle. June 18, 2020

    Survey Results Indicate Major Security Concerns with an At-Home Workforce Hysolate recently polled industry leaders at the FS-ISAC Virtual Summit to get a better understanding of how organizations are addressing access to privileged environments today, and how comfortable they are with their current approaches, especially in the emphasized work-from-home paradigm we all find ourselves in. […]

  • COVID-19 Is Breeding More Cyberattacks: Here’s How to Contain Them

    By Mariel Sable. June 9, 2020

    There’s a lot we don’t understand and couldn’t have guessed about COVID-19. But one thing that many in the cybersecurity space anticipated, and which unfortunately is coming true, is the rise in cyberattacks. As a just-completed Team8 survey revealed that 85 percent of medium- to large-sized businesses are reporting a surge in these attacks. The […]

  • Plugging Remote Desktop Security Holes

    By Oleg Zlotnik. June 4, 2020

    These days, almost everyone who can work remotely is doing so. Many remote workers use their corporate laptops from home. Others use their personal devices to connect to a corporate VDI (Virtual Desktop Infrastructure). And some leave their corporate devices at work and connect to them remotely from their personal devices, including phones and tablets. […]

  • What Attackers Think About Your Cybersecurity Isolation Strategy

    By Mariel Sable. May 21, 2020

    Isolation is something we’re becoming all too familiar with these days. However isolation is not a new concept, especially in the cybersecurity world. Security professionals have been using isolation techniques to keep viruses at bay for years. The strategies have evolved over time, and today include virtual desktop infrastructure (VDI), app sandboxing, browser isolation, physical […]

  • Building a Cyber Security Strategy & Plan As a New CISO

    By Ted Milewicz. May 12, 2020

    As a CISO, your cyber security strategy plan drives data protection for the organization across every aspect of business processes including new hires and onboarding. It’s not uncommon for an organization to have an HR step where the hiring manager requests network account credentials and permissions for a new employee. Without the right procedures in […]

  • Thinking Beyond Cybersecurity Vulnerability Assessments: What’s Next?

    By Yan Aksenfeld. May 6, 2020

    Having vulnerabilities isn’t always a bad thing. In personal interactions, for instance, being vulnerable can lead to deeper, more meaningful relationships.   But we’re not talking psychology today. We’re talking cybersecurity. And when it comes to IT infrastructure, vulnerabilities are nothing but bad. The average cost of a data security breach is $3.92 million worldwide and […]

  • Credential Stuffing Attack Prevention & Mitigation

    By Josh Hogle. April 28, 2020

    You know how security experts keep telling you not to use the same password on multiple accounts? Yup, there’s a good reason for that. It’s called credential stuffing. It’s a type of cyberattack that affects the security of millions of people. As bad as that might sound, there are ways to prevent such attacks and […]