Tag: Virtualization Security
-
What the Sci-Fi Hit Altered Carbon Teaches Us About Virtualization Security
The Netflix show may be fantastical, but it has real-world lessons about virtualization. In a dark and dystopian future, the Netflix show …
-
Bromium introduces one-click use case deployment in Secure Platform 4.1
Prioritize security around common customer pain points with targeted use case deployment Run native Chrome on the host for low-risk …
-
Internet Explorer is Dead, Long Live Internet Explorer?
Most enterprises still need Internet Explorer for access to legacy web applications While Chrome and Edge are significantly more secure …
-
Five Reasons Why Marketing Should Care About Cybersecurity
Marketing moves fast and worrying about cybersecurity is often the least of our worries. Cybercriminals understand we’re working fast and …
-
Malware copies file to evade anti-virus, detection-based cybersecurity tools
New malware technique evades detection by simply copying a file We break it down step-by-step to show you how it works Innovative hackers …
-
How to Secure Microsoft Edge browser downloads with Bromium Platform
Microsoft Edge browser does not isolate web file downloads Learn how to use Bromium to isolate your Microsoft Edge web file downloads …
-
Carahsoft Named Official Distributor for Bromium Cybersecurity
We’ve been working with Carahsoft for years, but are proud to make things “official” today as we tap them to help us extend our …
-
Ian Pratt, Bromium Co-Founder, Speaks on Spectre and Meltdown – Video, Part 1
The Intel chip vulnerability triggered Spectre and Meltdown – information leakage vulnerabilities. Both let attackers that have execution …
-
Malicious Email Attachments Stopped Via Application Isolation
Safely open any email attachment from Outlook or web mail, even if it contains malware Eliminate restrictive IT security policies that …
-
Protect against the undetectable Process Doppelgänging with Bromium
Process Doppelgänging is a new code injection technique that bypasses most security tools and works on all Windows versions. Relying on …
-
Bromium Emotet Banking Trojan polymorphic malware analysis
We analyzed samples containing the Emotet banking trojan and broke down the findings in a side-by-side comparison. Malware authors are …
-
Protect your intellectual property with application isolation
Detection-based IT security solutions have never worked, and will never work. More security layers is not the answer, but smarter layers …
●●●