Menlo Security
Organizations unprepared for a new class of cyber threats: HEAT attacks
Organizations are mostly concerned about ransomware and malware, but despite these growing risks, just 27% have implemented an advanced threat protection on every endpoint …

HEAT attacks: A new class of cyber threats organizations are not prepared for
Web malware (47%) and ransomware (42%) now top the list of security threats that organizations are most concerned about. Yet despite the growing risks, just 27% have advanced …

Highly Evasive Adaptive Threats (HEAT) bypassing traditional security defenses
Menlo Security announced it has identified a surge in cyberthreats, termed Highly Evasive Adaptive Threats (HEAT), that bypass traditional security defenses. HEAT attacks are …

Employees think they’re safe from cyberthreats on company devices
A research launched by Menlo Security reveals increased cybersecurity risks posed to employees and organizations during the 2021 holiday shopping season. The research – which …

Remote access security strategy under scrutiny as hybrid/remote working persists
A report by Menlo Security highlights growing concerns about securing users as the trend for hybrid and remote working is set to remain. The new report – which surveyed 500+ …
Devin Ertel joins Menlo Security as CISO
Menlo Security announced the appointment of Devin Ertel as Chief Information Security Officer (CISO). In this role, he is responsible for providing internal cybersecurity …
Votiro introduces an AWS S3 bucket connector to reduce risk of weaponized files in storage buckets
Votiro announced the addition of an AWS S3 bucket connector to its Secure File Gateway solution suite. This capability will allow customers working with AWS storage to safely …

Organizations increasingly reluctant to pay ransomware demands
To better understand concerns about recent ransomware attacks, Menlo Security conducted a global poll on responses and reactions to ransomware. attacks. Organizations hit by …

76% of IT decision makers more vulnerable to mobile attacks than just a year ago
53 percent of IT decision makers admitted that it’s not possible to be prepared for all the tactics and strategies used by attackers targeting mobile devices, a survey by …
Menlo Security partners with Microsoft to provide defenses to customers faster
Menlo Security announced that the company is partnering with Microsoft to obtain advance vulnerability information through the Microsoft Active Protections Program (MAPP). …
Menlo Security partners with VMware to protect mobile devices from ransomware and phishing
Menlo Security, a leader in cloud security, announced its Global Cloud Proxy Platform built on an Isolation Core is integrated with VMware Workspace ONE Unified Endpoint …

Photos: RSA Conference 2020, part 4
RSA Conference 2020 is underway at the Moscone Center in San Francisco. Check out our microsite for the conference for all the most important news. Here are a few photos from …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility