Published inThe StartupEDR/EPP Fails to Protect Your Browser— Why?CrowdStrike, Carbon Black, and other EDR solutions leave a gaping hole in your security — the browser.Feb 25, 2021Feb 25, 2021
Published inThe StartupWhat Is Browser Endpoint Detection and Response?Savvy security folks are aware that determined threat actors and spearphishers can be patient and resourceful in their efforts to breach…Oct 15, 20201Oct 15, 20201
Proxies and Gateways: Legacy Web Security & the FutureIt’s no secret that companies are targeted daily by attacks against your browsers and devices. These attacks include:Sep 30, 2020Sep 30, 2020
Browser Isolation: Types ExplainedQuickly learn about the different types of Browser Isolation, from Native to Remote.Aug 10, 2020Aug 10, 2020
Remote Browser Isolation VS Native Isolation: What’s the difference?Browser Isolation is a relatively new technology, expected to be an even larger part of the security stack in 2021…Jul 24, 2020Jul 24, 2020
Native Browser Isolation as an Extension | TAG CyberThe internet can be a scary place. Most end users don’t give much thought to browsing for information, work related or otherwise. The…Jun 25, 2020Jun 25, 2020
Inspect the Web without Breaking It: SSL Inspection for the FutureSSL Inspection or HTTPS Inspection breaks SSL breaks security to collect traffic.Jun 16, 2020Jun 16, 2020
2018 Browser Security ChecklistSummer 2018 is quickly coming to a close. As we begin the next quarter and head toward the holiday season, scams and phishing become ever…Jul 24, 2018Jul 24, 2018
Stopping phishing, crypto hijacking, and data theft on ChromebooksChromebooks are a pretty damn secure platform. Businesses, schools, and even security practitioners have adopted them as a way to keep…Mar 28, 2018Mar 28, 2018