The Endpoint Isolation Blog

Showing results for cybersecurity best practices

  • How to Become a World-Class CISO

    By Mariel Sable. April 7, 2020

    What does it take to become a Chief Information Security Officer (CISO)? There are multiple answers, because it’s a multi-faceted role. Each person will bring a unique set of experiences to the job and there’s no clear-cut path or resume that defines the steps you must take to become a CISO. Yet, there are some […]

  • How to Secure DevOps Environments: Exploring Best Practices

    By Yuki Arbel. February 25, 2020

    Hard to believe, but it’s been more than a decade since the concept of DevOps was introduced. By eliminating the silos separating software development and operations teams, and fostering a more agile, collaborative environment, DevOps promised to help organizations deliver better software faster. By using automation to manage many of the tasks of building, testing, […]

  • Implementing Privileged Access Workstations For Zero Trust Architecture

    By Tal Zamir. January 21, 2020

    The Problem with Zero Trust With more and more enterprises moving to mobile and cloud technologies, it’s becoming extremely difficult to enforce perimeter security. That’s why so many organizations are adopting Zero-Trust Architecture (ZTA). It enables them to grant access based on device/user credentials instead of a user’s presence in the corporate network. But as […]

  • Hysolate workstations NOT impacted by new Windows CryptoAPI Spoofing Vulnerability

    By Tal Zamir. January 16, 2020

    Summary Microsoft recently disclosed a spoofing vulnerability that enables an attacker to sign a malicious executable, making it appear that the file was from a trusted, legitimate source. It also enables attackers to conduct man-in-the-middle network attacks. In the recommended configuration of Hysolate, Hysolate customers are not impacted by this vulnerability due to Hysolate’s secure-by-design […]

  • New Insights into Privileged Access Management (PAM) Best Practices

    By Jessica Stanford. January 15, 2020

    The increasingly sophisticated and persistent nature of cyber threats underscores the importance of protecting your privileged accounts, along with their respective privileged users and privileged credentials. Privileged accounts, by their very nature, tend to be the sort of digital “crown jewels” that are much sought-after by hackers. Best practices for Privileged Access Management (PAM), the […]

  • Taking Zero Trust Network Access to The Next Level

    By Tal Zamir. December 30, 2019

    What is Zero Trust? Zero trust is a security model based on maintaining strict access control. It has risen in popularity since Forrester coined the term in 2010.  Initially, Zero trust referred an enterprise security architecture that relied on a trusted internal network protected by firewalls that enforce perimeter security. However, with enterprises adopting mobile […]

  • Endpoints and Network Segmentation Best Practices

    By Yan Aksenfeld. December 23, 2019

    Network segmentation is a common and effective cybersecurity countermeasure. As attacks get more sophisticated, however, security tactics need to advance in parallel. For example, endpoints (laptops, desktops and workstations) are often considered among the “weakest links” in a cybersecurity strategy. They are thus the prime targets for network penetration attacks. That said, it’s apparent that […]

  • VDI Challenges: The Problem with VDI

    By Tal Zamir. December 15, 2019

    Anyone who’s been in enterprise IT long enough has already heard of, tested or deployed virtual desktop infrastructure (VDI) solutions (like VMware and Citrix). And why not? The promises made by VDI vendors have been compelling, if not always accurate: cost savings, enabling bring your own device (BYOD), improving the user experience and business continuity,  […]

  • VDI Security Best Practices: Breaking the Myth

    By Tal Zamir. December 14, 2019

    CISOs and security professionals often refer to Virtual Desktop Infrastructure (VDI) (made popular by VMWare & Citrix) and other “remote application” solutions as security barriers that hackers have a hard time bypassing. That’s a myth, and here’s why. 1. Thin client scenarios are precarious.  These virtualization efforts pose only a minor hurdle to determined cyber-criminals. […]

  • Page 1 of 2
  • 1
  • 2