CrowdStrike, Carbon Black, and other EDR solutions can’t access browser information, preventing them from stopping modern attacks or providing any visibility.

Image for post
Image for post
Source: Google Chromium Blog

Modern browsers prevent problems that propagate from the browser to the OS, by encrypting data and memory. By doing so, EPP and EDR tools can’t retrieve or write data directly to the browser without a third-party. That means there’s a gap in your endpoint protection, which just so happens to be where most people are working, the browser.

By leaving the browser vulnerable, you’re leaving your endpoint devices open to spearphishing, malicious downloads, extension data leaks, malvertising, and there’s…


Image for post
Image for post

Savvy security folks are aware that determined threat actors and spearphishers can be patient and resourceful in their efforts to breach your organization and defeat your defenses. In the past few years, attacks have moved to the most vulnerable piece of your network — your browser. Email, operating systems, and endpoint software is patched and kept secure while attackers deliver social engineering attacks completely unhindered.

This failure is often a lack of visibility and little to no protection from malicious websites. Browser Endpoint Detection and Response (B-EDR) is the solution for addressing this challenge. …


Image for post
Image for post

It’s no secret that companies are targeted daily by attacks against your browsers and devices. These attacks include:

  • Malware is any malicious software. This category includes spyware, viruses, and ransomware, the latter a type of malware that holds the victim’s data hostage until they make a payment (and sometimes after).
  • Phishing attacks attempt to trick the user into providing credentials and other identifying information to the scammers.
  • Malvertising uses legitimate advertising methods to spread malware through code injection and other methods.

Software developers, network administrators, and device manufacturers are among the professionals who attempt to thwart these attacks. Although their…


Image for post
Image for post

Cybersecurity threats have evolved. At one time attacks came through direct email or text messages. Now browsers are the greatest avenue of vulnerability, be it from malware, phishing schemes or most other type of security attack.

The new focus on the browser means cybersecurity experts have to find new and novel ways to protect against attacks. This new innovation in security is browser isolation. Not all kinds of browser isolation offer identical levels of protection, however. In addition, some variations of this technology detract from user experience and leave businesses without data critical to full functioning of their operations.

This…


Image for post
Image for post

Browser Isolation is a relatively new technology, growing in popularity in 2019 & 2020, expected to be an even larger part of the security stack in 2021 and beyond, according to Gartner.

What is Browser Isolation?

The purpose of the technology is to create an “air gap” between the user’s browser and the internet, keeping them safe from online attacks like malicious downloads and phishing.

There are multiple types of isolation but the two most common are remote browser isolation and Native Browser Isolation, that bridges the gaps between Local and Remote Browser Isolation.

Many companies are exploring the technology to fit into their…


Image for post
Image for post

The internet can be a scary place. Most end users don’t give much thought to browsing for information, work related or otherwise. The internet is simply a vehicle and it’s the first place most people go when they need to quickly find what they want. While an employee may be diligently looking at competitors’ websites for an assigned work project, searching for cyber security training to enhance their skills, or ordering new supplies for the office, they may inadvertently stumble upon a malicious site crafted by criminals for the purposes of stealing credentials, delivering malware, or initiating some other form…


SSL Inspection or HTTPS Inspection breaks SSL encrypted internet communication between the client and the server. The interception is typically done on the server and its purpose is to see “inside” encrypted web traffic. Legacy security applications block millions of SSL encrypted messages that contain advanced threats everyday, so without inspecting it, data around those attacks is limited.

Image for post
Image for post

SSL encryption is sophisticated but not perfect. When a client, such as a browser, first sends an HTTPS request to a Web server, it starts a series of message exchanges called the SSL handshake. During the SSL handshake:

  1. The server sends its…

Summer 2018 is quickly coming to a close. As we begin the next quarter and head toward the holiday season, scams and phishing become ever more prevalent. Here’s a “quick win” guide for companies looking to keep their users and their browsers secure.

Image for post
Image for post
Deceptive site warning from Apozy.

Managed Browsers and Profiles

Pick a browser that is secure and ensure 100% adoption throughout your organization. I recommend going with Google Chrome. If you’re a GSuite/Google Enterprise customer, you have the ability to push and manage profiles and software easily through their interface. …


Spearphishing Detection Effectiveness

The Update

We’re very proud to announce that we recently published a brand new version of Apozy NoHack Enterprise Edition(EE) for our customers. We’ve worked very hard on the technology behind it and we now detect malicious pages in real-time with zero latency. Our technology relies on the visual analysis of a page combined with both proprietary and industry standard checks to accurately predict when a site is harmful.

The Test

We conducted many tests to prove NoHack EE works as intended. To determine false negative rate, we used the real-time submission of phishing links via PhishTank


Chromebooks are a pretty damn secure platform. Businesses, schools, and even security practitioners have adopted them as a way to keep control over traveling devices while maintaining a high level of security. Their ability to be remotely wiped clean, sandbox individual browser tabs, and ensure a secure boot process make them a locked down platform for wide deployment.

Mentored someone on teaching computing basics to seniors.
“What antivirus to buy?”
“Buy a Chromebook.”
“What about…”
“Chromebook.”

— SwiftOnSecurity (@SwiftOnSecurity) July 23, 2015

They also have their downsides. The most significant is the inability to run full applications or any sort…

Rick Deacon

Hacker, exec, car enthusiast.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store