-
Endpoint Security Checklist: The Experts Weigh in
Last month the Hysolate team ran a webinar with security experts Chris Roberts, Diana Kelley and Tal Zamir, discussing the current endpoint situation (no, you cannot protect against every threat), what exactly we mean by endpoints in 2022 (yes, your fridge and your car are also now endpoints) and hard questions to ask endpoint security … Continued
Read More -
VDI Security Best Practices: Busting the Myths
As 2022 begins and remote work has gone from a growing trend to a necessity for many enterprise companies around the globe, administrators and management are re-evaluating their enterprise VDI solutions. “From a cyber and data security perspective, as well as a technological perspective, there are many challenges with the current environment,” says Steven Estep, … Continued
Read More -
IT Leaders: Start Allowing Fast Access to Any App, Securely!
I’m writing this article in the midst of the COVID-19 crisis, a year after we first left our offices and moved to remote work. While it has immediate implications on all of our lives – both physically and virtually – it also gives us a glimpse into the future of cybersecurity and end-user computing. This … Continued
Read More -
Mythbusting Network Security Architecture Best Practices
Given the cyberattack surface area presented by networks, it’s little surprise that network security professionals try to adhere to network security architecture best practices. A network must have security embedded in its very design. However, while best practices like network segmentation and device hardening are wise and worth pursuing, they are becoming increasingly deficient. This … Continued
Read More -
Remote Access Security: Risks & Best Practices
Remote access has helped businesses function for decades. It makes it possible for mobile and dispersed workforces, including employees, contractors, partners, and vendors, to access corporate IT systems and data from anywhere, anytime. The rise of telework — 52% of global workers are said to work from home at least once a week — has … Continued
Read More -
How to Become a World-Class CISO
What does it take to become a Chief Information Security Officer (CISO)? There are multiple answers, because it’s a multi-faceted role. Each person will bring a unique set of experiences to the job and there’s no clear-cut path or resume that defines the steps you must take to become a CISO. Yet, there are some … Continued
Read More -
Benefits of the Least Privileged Principle: Assuming A Breach
Extending the Benefits of the Principle of Least Privilege If you’ve ever had a job where certain information was dispersed on a need-to-know basis (and who hasn’t), then you can relate to the principle of least privilege (PoLP). In a broad sense, it’s about restricting access to sensitive data. Only people whose roles require that … Continued
Read More -
How to Secure DevOps Environments: Exploring Best Practices
Hard to believe, but it’s been more than a decade since the concept of DevOps was introduced. By eliminating the silos separating software development and operations teams, and fostering a more agile, collaborative environment, DevOps promised to help organizations deliver better software faster. By using automation to manage many of the tasks of building, testing, … Continued
Read More -
Privileged Access Workstations For Zero Trust Architecture
The Problem with Zero Trust With more and more enterprises moving to mobile and cloud technologies, it’s becoming extremely difficult to enforce perimeter security. That’s why so many organizations are adopting Zero-Trust Architecture (ZTA). It enables them to grant access based on device/user credentials instead of a user’s presence in the corporate network. But as … Continued
Read More -
Hysolate Workstations NOT impacted by CryptoAPI Vulnerability
Summary Microsoft recently disclosed a spoofing vulnerability that enables an attacker to sign a malicious executable, making it appear that the file was from a trusted, legitimate source. It also enables attackers to conduct man-in-the-middle network attacks. In the recommended configuration of Hysolate, Hysolate customers are not impacted by this vulnerability due to Hysolate’s secure-by-design … Continued
Read More -
New Insights into Privileged Access Management (PAM) Best Practices
The increasingly sophisticated and persistent nature of cyber threats underscores the importance of protecting your privileged accounts, along with their respective privileged users and privileged credentials. Privileged accounts, by their very nature, tend to be the sort of digital “crown jewels” that are much sought-after by hackers. Best practices for Privileged Access Management (PAM), the … Continued
Read More -
Taking Zero Trust Network Access to The Next Level
What is Zero Trust? Zero trust is a security model based on maintaining strict access control. It has risen in popularity since Forrester coined the term in 2010. Initially, Zero trust referred an enterprise security architecture that relied on a trusted internal network protected by firewalls that enforce perimeter security. However, with enterprises adopting mobile … Continued
Read More -
Endpoints and Network Segmentation Best Practices
Network segmentation is a common and effective cybersecurity countermeasure. As attacks get more sophisticated, however, security tactics need to advance in parallel. For example, endpoints (laptops, desktops and workstations) are often considered among the “weakest links” in a cybersecurity strategy. They are thus the prime targets for network penetration attacks. That said, it’s apparent that … Continued
Read More -
VDI Challenges: The Problem with VDI
Anyone who’s been in enterprise IT long enough has already heard of, tested or deployed virtual desktop infrastructure (VDI) solutions (like VMware and Citrix). And why not? The promises made by VDI vendors have been compelling, if not always accurate: cost savings, enabling bring your own device (BYOD), improving the user experience and business continuity, … Continued
Read More -
Finding the Balance with Windows Local Administrator Rights
As a systems administrator, it has always been a difficult struggle to balance Microsoft User Rights Assignments in the Windows Operating System. Too much access on a file system is dangerous, while not enough causes subsequent tickets created at a help-desk. An equilibrium of supportability and security is ideal, yet seldom achieved. Windows Local Administrator … Continued
Read More -
The WhatsApp Hack
Could it be used to compromise your corporate environment? This week a vulnerability in the messaging app WhatsApp was reported that has allowed attackers to inject commercial spyware on to phones. WhatsApp, which is used by 1.5 billion people worldwide, discovered in early May that attackers were able to install surveillance software on to both … Continued
Read More -
5 Reasons You Should Never Trust USB Devices
Go ahead – plug that USB device into your machine! Organizations – especially large enterprises – often have restrictions in place against using USBs. Their risks have been documented for years. This thread from 5 years ago talks about the risks of using USB over other media like CDs! The threats still prevail for USB … Continued
Read More
TheWorkspace Isolation Blog
Showing results for cybersecurity best practices
Search by Tag
- Azure Active Directory (1)
- Azure AD and Microsoft Intune Archives (1)
- BYOD (2)
- BYOPC (2)
- cisco duo (1)
- Citrix (1)
- conditional access (1)
- Cyber Security Strategies (25)
- cybersecurity (2)
- cybersecurity awards (2)
- cybersecurity best practices (17)
- DaaS (6)
- DaaS for developers (1)
- developer (1)
- development lifecycle (1)
- end user computing (1)
- endpoint hardening (1)
- endpoint isolation (1)
- endpoint protection solutions (1)
- endpoint protection stack (1)
- endpoint security (17)
- endpoint security innovation (1)
- enterprise vdi best practices (1)
- Hysolate awards (2)
- hysolate free (3)
- Infosec awards 2021 (1)
- Intune (1)
- isolate risky activities (1)
- Isolated desktop (1)
- isolated desktop as a service (1)
- isolated workspace (1)
- isolated workspace as a service (2)
- isolation (12)
- IT freedom (1)
- IT leadership (1)
- IT productivity (3)
- IT security (1)
- Microsoft ADD (1)
- miniservices vs microservices (1)
- one week sprints (1)
- operating systems (1)
- OS islolation (1)
- OS isolation (3)
- paw (10)
- phishing (1)
- ransomware (1)
- ransomware prevention (1)
- remote productivity (1)
- remote work (2)
- remote work financial sector (1)
- remote work productivity (1)
- scrum (1)
- secure access (1)
- secure access for enterprises (1)
- secure DaaS (2)
- secure open source (1)
- security guidelines for CISOs (1)
- security leadership (1)
- sensitive access (1)
- startup development (1)
- user productivity (8)
- vdi (7)
- vdi alternatives (2)
- vdi best practices (1)
- vdi costs (1)
- vdi vs daas (1)
- Virtual air gap (0)
- virtualization (11)
- what are windows containers (1)
- windows 10 sandbox (0)
- windows 11 (1)
- windows 365 (1)
- windows container intro (1)
- Windows isolation (1)
- Windows Sandbox (1)
- Windows Virtual Desktop (1)
- Zero Trust (1)
- Zero Trust for the Endpoint (1)