-
5 Pillars of a Cyber Security Strategy & Plan: a CISO’s Guide
Why is a Cyber Security Strategy Plan Important? A cyber security strategy offers a clear, detailed plan that standardizes security across the organization. It helps CISOs shift from reactive to proactive security, ensuring that they are ready and prepared to respond to various relevant threats. A recent Ponemon Institute survey discovered that many organizations have … Continued
Read More -
System Hardening Guidelines for 2022: Critical Best Practices
Wouldn’t it be amazing if our laptops were as secure as Fort Knox? Where it’s so hard for bad actors to access your sensitive data, that they don’t even try? While operating systems, like Microsoft Windows, have become more secure over time, they’re nowhere close to being impenetrable. That’s why enterprises need to be hyper-vigilant … Continued
Read More -
Application Sandboxing: 3 Perspectives To Consider
Many IT organizations use app sandboxing in an attempt to safeguard sensitive information from cybercriminals. It’s a pretty straight-forward concept: contain threats coming from the sandboxed application to prevent them from affecting the operating system. Google Chrome and Apple Safari are simple examples of this technique in action. It’s kind of like making sure your … Continued
Read More -
IT Leaders: Start Allowing Fast Access to Any App, Securely!
I’m writing this article in the midst of the COVID-19 crisis, a year after we first left our offices and moved to remote work. While it has immediate implications on all of our lives – both physically and virtually – it also gives us a glimpse into the future of cybersecurity and end-user computing. This … Continued
Read More -
Extending Zero Trust to the Endpoint
What is Zero Trust? Zero trust is a security model based on maintaining strict access control. It has risen in popularity since Forrester coined the term in 2010. Initially, Zero trust referred to an enterprise security architecture that relied on a trusted internal network protected by firewalls that enforce perimeter security. However, with enterprises adopting … Continued
Read More -
Managing Your Security Product in the Cloud, Like a Spartan
The famous movie “300” tells the story of king Leonidas and his 300 Spartan warriors – who withstood a monumental attack by the Persian empire during the battle of Thermopylae, even though they were significantly outnumbered. Despite the fact king Leonidas did not know much about enterprise-grade security, there are multiple decisions that he had … Continued
Read More -
Non-Persistent VMs with a Persistent User Experience
Desktop virtualization solutions and use cases Desktop virtualization for end users in organizations is not a new concept. Since the 90’s, Citrix has been offering end users remote access to corporate software running in the datacenter. While managed virtual desktop infrastructure has provided a full desktop in the datacenter since the early 2000’s, and has … Continued
Read More -
Improving Your Vulnerability Remediation Process
As security teams know all too well, data breaches are a fact of life. They’re also a huge thorn in the side of many companies. With the average data security breach costing $3.92 million worldwide and $8.19 million in the US, and resulting in untold damages to reputations and customers, it’s easy to see why. … Continued
Read More -
Thinking Beyond Cybersecurity Vulnerability Assessments
Having vulnerabilities isn’t always a bad thing. In personal interactions, for instance, being vulnerable can lead to deeper, more meaningful relationships. But we’re not talking psychology today. We’re talking cybersecurity. And when it comes to IT infrastructure, vulnerabilities are nothing but bad. The average cost of a data security breach is $3.92 million worldwide and … Continued
Read More -
Credential Stuffing Attack Prevention & Mitigation
You know how security experts keep telling you not to use the same password on multiple accounts? Yup, there’s a good reason for that. It’s called credential stuffing. It’s a type of cyberattack that affects the security of millions of people. As bad as that might sound, there are ways to prevent such attacks and … Continued
Read More -
Rethink Your Cyber Security Stack to Avoid Agent Fatigue
No sane person would say cyber security is under control. We’ve all read about way too many data breaches that expose sensitive corporate and personal information, putting hundreds of thousands or millions of people at risk, costing companies enormous sums of money, and damaging corporate reputations. In an attempt to win more battles than they … Continued
Read More -
Enter the Matrix: Cyber Security Risk Assessments Demystified
Cyber security professionals are, by definition, in the risk management business. Your job is all about making sure information systems and sensitive data are protected against cyber attacks. And now with COVID 19 pushing more workers — and work — online than ever before, getting a handle on your evolving risk couldn’t be more critical. … Continued
Read More -
The Best Privileged Access Management Solutions in 2020
What are the best Privileged Access Management (PAM) Solutions in 2020? The answer depends on who you ask and what your particular needs might be. It’s not like the Miss America Pageant, where one lucky winner takes home the crown. Rather, potential buyers of PAM, as the technology is often called, have their choice of … Continued
Read More -
Defending Against The Most Common Cyber Attack Vectors
When I was a kid, Red Rover was one of the popular playground games. Two teams lined up across from each other, each linking arms. One side yelled, “Red rover, red rover, we call [player’s name] over,” at which point the named girl or boy runs over and tries to break through the opposing team’s … Continued
Read More -
Web Browser-Based Attacks: How to Protect Users
Browser attacks are one of the most popular ways for cyber criminals to inflict damage. This shouldn’t be surprising considering how exposed web browsers are and how much sensitive information they hold, such as credit card details, passwords, IDs, and more. By compromising web browsers like Google Chrome, Microsoft Internet Explorer or Mozilla Firefox, hackers … Continued
Read More -
Pass-the-Hash Attack Mitigation: The Complete Guide
The notorious “Pass-the-Hash” (PtH) attack is very much with us these days. If anything, it’s getting worse, as Advanced Persistent Threats (APTs) often use the technique to move laterally across networks in stealth mode. Virtual Machine (VM) isolation, as provided by Hysolate, offers an effective countermeasure. What is a “Pass-the-Hash” attack? To understand how a … Continued
Read More -
Sandboxing in Cyber Security: How Does It Fit In Your Stack?
There’s no shortage of options when it comes to protecting corporate information from malware. A typical security stack includes everything from antivirus, firewalls, and data loss prevention (DLP), to network security and endpoint detection and response (EDR) tools. However, as we know all too well, while these tools provide some needed protection, they don’t stop … Continued
Read More -
The Best Attack Surface Reduction Method To Win The Endpoint Security Battle
For over 2,000 years, people have leveraged elevated terrain, or “high ground,” to gain a strategic advantage over enemies and protect their realm. The Chinese “Art of War” suggests high ground as a strategic position that provides a wide point of view with full visibility over the landscape. In medieval Europe, castles and fortresses included … Continued
Read More -
Strong Authentication for Endpoint Security: 3 Perspectives
Authentication solutions have been around for years. I actually started my cyber career working on one of the original and best two-factor (2FA) products – SecurID. Over the decades, the tech we use, the way we communicate and connect, and the threats we face have changed dramatically. So has authentication. 2FA is now MFA – … Continued
Read More -
Finding the Balance with Windows Local Administrator Rights
As a systems administrator, it has always been a difficult struggle to balance Microsoft User Rights Assignments in the Windows Operating System. Too much access on a file system is dangerous, while not enough causes subsequent tickets created at a help-desk. An equilibrium of supportability and security is ideal, yet seldom achieved. Windows Local Administrator … Continued
Read More -
How Hysolate Mitigates Windows 7 End-of-Life Issues
The end of the Windows 7 lifecycle is fast approaching: January 2020. This pending “end of life” means Microsoft will discontinue all support, including paid support, and all updates, including security updates. Of course, Microsoft might make an exception for some of its larger customers, but at a heavy price. What does this mean for … Continued
Read More -
3 Perspectives on Browser Isolation
Isolation is an increasingly popular endpoint security strategy, and with good reason. It reduces risk by separating endpoint attack vectors from cyber criminals. Browser isolation is one of several isolation approaches. (Application, virtual and physical air gaps and virtual desktop infrastructure/VDI are others). Its concept is simple: move Internet activity away from a company’s local networks … Continued
Read More -
Network Isolation with Virtual Endpoints
Network Isolation, the segmenting of a computer network into separate zones with distinct trust levels, for the purpose of containing hazards or reducing damage caused by a threat actor, is a hallmark of nearly every security-minded network design. Even though implementing port security policies, VLANs, VPNs, and other technologies can take many months of planning … Continued
Read More -
EPP: 3 Perspectives on Endpoint Security Strategies
When considering endpoint security strategies, it’s incredibly common to have an endpoint protection platform (EPP) in place. Let’s face it – Anti-virus (AV) is the OG endpoint security solution. Over the years, these tools have evolved into next generation antivirus (NGAV) and endpoint detection and response (EDR). What that really means is that vendors have … Continued
Read More -
CyberTech 2019 – Our Take
It’s been a week since Cybertech 2019, and while the event made headlines for some of its famous speakers, most notably Benjamin Netanyahu, it held great importance for Hysolate for many more reasons. Our co-founder and CEO, Tal Zamir, had the opportunity to speak on a panel with fellow Team 8 co-founders Ofer Israeli, Illusive, … Continued
Read More
TheWorkspace Isolation Blog
Showing results for Cyber Security Strategies
Search by Tag
- Azure Active Directory (1)
- Azure AD and Microsoft Intune Archives (1)
- BYOD (2)
- BYOPC (2)
- cisco duo (1)
- Citrix (1)
- conditional access (1)
- Cyber Security Strategies (25)
- cybersecurity (2)
- cybersecurity awards (2)
- cybersecurity best practices (17)
- DaaS (6)
- DaaS for developers (1)
- developer (1)
- development lifecycle (1)
- end user computing (1)
- endpoint hardening (1)
- endpoint isolation (1)
- endpoint protection solutions (1)
- endpoint protection stack (1)
- endpoint security (17)
- endpoint security innovation (1)
- enterprise vdi best practices (1)
- Hysolate awards (2)
- hysolate free (3)
- Infosec awards 2021 (1)
- Intune (1)
- isolate risky activities (1)
- Isolated desktop (1)
- isolated desktop as a service (1)
- isolated workspace (1)
- isolated workspace as a service (2)
- isolation (12)
- IT freedom (1)
- IT leadership (1)
- IT productivity (3)
- IT security (1)
- Microsoft ADD (1)
- miniservices vs microservices (1)
- one week sprints (1)
- operating systems (1)
- OS islolation (1)
- OS isolation (3)
- paw (10)
- phishing (1)
- ransomware (1)
- ransomware prevention (1)
- remote productivity (1)
- remote work (2)
- remote work financial sector (1)
- remote work productivity (1)
- scrum (1)
- secure access (1)
- secure access for enterprises (1)
- secure DaaS (2)
- secure open source (1)
- security guidelines for CISOs (1)
- security leadership (1)
- sensitive access (1)
- startup development (1)
- user productivity (8)
- vdi (7)
- vdi alternatives (2)
- vdi best practices (1)
- vdi costs (1)
- vdi vs daas (1)
- Virtual air gap (0)
- virtualization (11)
- what are windows containers (1)
- windows 10 sandbox (0)
- windows 11 (1)
- windows 365 (1)
- windows container intro (1)
- Windows isolation (1)
- Windows Sandbox (1)
- Windows Virtual Desktop (1)
- Zero Trust (1)
- Zero Trust for the Endpoint (1)