The Workspace Isolation Blog

  • Why I Joined Hysolate

    By Marc Gaffan. July 30, 2019

    I’m excited to be starting a new journey as CEO of Hysolate. I first met Tal Zamir, Hysolate’s Founder, two and a half years ago when he was just getting started with Hysolate. He presented this grand vision of splitting up people’s laptops into multiple, totally isolated and virtualized operating systems but unifying them into […]

  • EPP: 3 Perspectives on Endpoint Security Strategies

    By karinerhysolate. July 23, 2019

    When considering endpoint security strategies, it’s incredibly common to have an endpoint protection platform (EPP) in place. Let’s face it – Anti-virus (AV) is the OG endpoint security solution. Over the years, these tools have evolved into next generation antivirus (NGAV) and endpoint detection and response (EDR). What that really means is that vendors have […]

  • Did Cyber Terror Win?

    By Tal Zamir. July 10, 2019

    I hate airport security. The endless lines. Taking off your shoes. And your jacket. And your belt.  Pulling all of your gadgets / laptops / tablets out of your bag, throwing away your toothpaste because it’s oversized, being scanned by mysterious scanners, being patted-down by strangers, answering security questions about your visit at 6AM after […]

  • The WhatsApp Hack

    By Tal Zamir. May 16, 2019

    Could it be used to compromise your corporate environment? This week a vulnerability in the messaging app WhatsApp was reported that has allowed attackers to inject commercial spyware on to phones. WhatsApp, which is used by 1.5 billion people worldwide, discovered in early May that attackers were able to install surveillance software on to both […]

  • Protecting Against the Latest Windows DHCP Vulnerabilities

    By Tal Zamir. March 19, 2019

    Microsoft’s recent security patches, released on “Patch Tuesday,” reveal more vulnerabilities with Windows Dynamic Host Configuration Protocol (DHCP). Here’s what they imply and how Hysolate protects against them. Quick Summary: Of the 64 bugs squashed in Redmond’s March update, three caught our eyes: CVE-2019-0697, CVE-2019-0698, and CVE-2019-0726, all of which address holes in the DHCP […]

  • CyberTech 2019 – Our Take

    By karinerhysolate. February 8, 2019

    It’s been a week since Cybertech 2019, and while the event made headlines for some of its famous speakers, most notably Benjamin Netanyahu, it held great importance for Hysolate for many more reasons. Our co-founder and CEO, Tal Zamir, had the opportunity to speak on a panel with fellow Team 8 co-founders Ofer Israeli, Illusive, […]

  • How to Stop Privileged Accounts From Being Compromised

    By Yuki Arbel. February 1, 2019

    In recent years, enterprises have started to become much more aware of the importance of IT hygiene for privileged accounts. With so many public cases of hackers gaining access to critical resources and causing insurmountable damage, it’s hard to escape the reality of today’s ever-increasing cyberattacks. One prominent example is the attack on the Ukrainian […]

  • Application Sandboxing: 3 Perspectives To Consider

    By Tal Zamir. January 14, 2019

    Many IT organizations use app sandboxing in an attempt to safeguard sensitive information from cybercriminals. It’s a pretty straight-forward concept: contain threats coming from the sandboxed application to prevent them from affecting the operating system. Google Chrome and Apple Safari are simple examples of this technique in action. It’s kind of like making sure your […]