The Workspace Isolation Blog

  • Plugging Remote Desktop Security Holes

    By Oleg Zlotnik. June 4, 2020

    These days, almost everyone who can work remotely is doing so. Many remote workers use their corporate laptops from home. Others use their personal devices to connect to a corporate VDI (Virtual Desktop Infrastructure). And some leave their corporate devices at work and connect to them remotely from their personal devices, including phones and tablets. […]

  • What Attackers Think About Your Cybersecurity Isolation Strategy

    By Mariel Sable. May 21, 2020

    Isolation is something we’re becoming all too familiar with these days. However isolation is not a new concept, especially in the cybersecurity world. Security professionals have been using isolation techniques to keep viruses at bay for years. The strategies have evolved over time, and today include virtual desktop infrastructure (VDI), app sandboxing, browser isolation, physical […]

  • Building a Cyber Security Strategy & Plan As a New CISO

    By Ted Milewicz. May 12, 2020

    As a CISO, your cyber security strategy plan drives data protection for the organization across every aspect of business processes including new hires and onboarding. It’s not uncommon for an organization to have an HR step where the hiring manager requests network account credentials and permissions for a new employee. Without the right procedures in […]

  • Thinking Beyond Cybersecurity Vulnerability Assessments: What’s Next?

    By Yan Aksenfeld. May 6, 2020

    Having vulnerabilities isn’t always a bad thing. In personal interactions, for instance, being vulnerable can lead to deeper, more meaningful relationships.   But we’re not talking psychology today. We’re talking cybersecurity. And when it comes to IT infrastructure, vulnerabilities are nothing but bad. The average cost of a data security breach is $3.92 million worldwide and […]

  • Credential Stuffing Attack Prevention & Mitigation

    By Josh Hogle. April 28, 2020

    You know how security experts keep telling you not to use the same password on multiple accounts? Yup, there’s a good reason for that. It’s called credential stuffing. It’s a type of cyberattack that affects the security of millions of people. As bad as that might sound, there are ways to prevent such attacks and […]

  • Rethink Your Cyber Security Stack to Avoid Agent Fatigue

    By karinerhysolate. April 21, 2020

    No sane person would say cyber security is under control. We’ve all read about way too many data breaches that expose sensitive corporate and personal information, putting hundreds of thousands or millions of people at risk, costing companies enormous sums of money, and damaging corporate reputations.  In an attempt to win more battles than they […]

  • Remote Access Security: Risks & Best Practices

    By Yuki Arbel. April 16, 2020

    Remote access has helped businesses function for decades. It makes it possible for mobile and dispersed workforces, including employees, contractors, partners, and vendors, to access corporate IT systems and data from anywhere, anytime.  The rise of telework — 52% of global workers are said to work from home at least once a week — has […]

  • How to Become a World-Class CISO

    By Mariel Sable. April 7, 2020

    What does it take to become a Chief Information Security Officer (CISO)? There are multiple answers, because it’s a multi-faceted role. Each person will bring a unique set of experiences to the job and there’s no clear-cut path or resume that defines the steps you must take to become a CISO. Yet, there are some […]