Michael Rosen

About Michael Rosen

Michael brings an extensive track record in security Product Management and Technical Product Marketing, making complex concepts readily accessible to general audiences. He has an MBA in Information Systems and a JD in Law, along with a hands-on technical background in malware analysis, encryption products, and multi-vector advanced threat defense. He is passionate about spreading the gospel of safe computing.
Sr. Product Manager, Threat Intelligence and Technical Marketing

Data Talks: Download Attacks Ignite While Attachments Cool Their Heels

2018-08-30T07:38:33+00:00August 30th, 2018|Threats|

Bromium customers see a significant increase in attacks via downloads as compared to email attachments "Compound attacks" are increasingly common, with cybercriminals employing multiple attack vectors in tandem No matter how the threats arrive, it’s critical to secure their ultimate targets, the vulnerable applications Welcome to the third edition of the Bromium Threat Labs Data [...]

Data Talks: The Big Shift to File-Based Attacks Scrambles the Security Industry

2018-08-22T09:27:13+00:00August 22nd, 2018|Threats|

Bromium sees a dramatic drop in the percentage of browser-based attacks in 2018 compared to file-based attacks Microsoft’s legacy Internet Explorer is now the only major web browser with serious remaining security concerns The clear majority of threats reaching endpoints today arrive via email attachments and browser file downloads Welcome to the second installment of [...]

Data Talks: Bromium Analyzes Live Running Malware from a Unique Threat Vantage Point

2018-08-01T19:12:37+00:00August 2nd, 2018|Threats|

Bromium Threat Labs debuts a new multi-part blog series called Data Talks The series features highlights of “live capture” threat research using aggregated data voluntarily reported by Bromium customers Look for deep-dives, trends, and predictions to guide you when you know that detection isn’t enough to keep you safe Today we’re kicking off a new [...]

Bromium Secure Platform 4.1 Streamlines Virtualization-based Security

2018-07-20T17:47:57+00:00July 2nd, 2018|Innovation|

Prioritize security around common customer pain points with targeted use case deployment Run native Chrome on the host for low-risk browsing while safely isolating web file downloads Transform raw data into actionable security insights with interactive dashboards and reports Virtualization-based security has changed the way organizations approach the idea of protecting their intellectual property from [...]

Phone the Sender – Best or Worst New Security Practice?

2018-07-25T11:05:45+00:00April 30th, 2018|Threats|

Sophisticated phishing attacks may originate from compromised email accounts of legitimate business partners New "best practice" security recommendation is to phone the sender whenever an unexpected attachment arrives Bromium isolates each email attachment so that users can click with confidence and maximize their productivity Do you receive a lot of email attachments from people you [...]

Bromium vs. Remote Browsers: Downloads Make the Difference

2018-03-26T08:00:22+00:00March 26th, 2018|Threats|

Remote browsers stop web exploits but do little to solve the much larger problem of malicious file downloads Users expect to download the actual documents they’ve selected, not remote renderings or hollow substitutes Bromium isolates web downloads so users can work safely with them fully-functional in their native file formats I don’t know about you, [...]

How to Use Bromium Application Isolation to Secure Microsoft Edge Downloads

2018-02-05T07:40:16+00:00February 5th, 2018|Innovation|

Microsoft Edge browser does not isolate web file downloads Learn how to use Bromium to isolate your Microsoft Edge web file downloads Bromium works with all Microsoft virtualization-based security (VBS) technologies Microsoft jumps on the application isolation bandwagon. In December 2017, Bromium welcomed the arrival of the Windows Defender Application Guard (WDAG) for Microsoft Edge, [...]

Browser Isolation with Microsoft Windows Defender Application Guard (WDAG): What It Does, How It Works and What It Means

2017-12-11T06:00:56+00:00December 11th, 2017|Innovation|

Microsoft brings hardware isolation to the web browser Bromium and Microsoft have similar approaches to browser isolation using virtualization Microsoft protects only their own OS and proprietary Microsoft applications Bromium works with all Microsoft VBS technologies, and together we secure far more of the Windows attack surface than Microsoft does on its own Creating momentum [...]

Securing the Modern Endpoint the SANS Maturity Way

2017-10-30T05:46:05+00:00October 30th, 2017|Threats|

In Case You Missed It Bromium recently engaged in a series of communications and events on the topic of Securing the Modern Endpoint, covering timely and provocative concepts including: How detection consistently fails to secure the enterprise and why new thinking is desperately needed How to realign your defenses around a modern threat risk model [...]

A Cybersecurity Proof: The Application is the Endpoint

2017-10-16T09:25:16+00:00October 16th, 2017|Threats|

Vulnerable applications and browsers are the persistent data breach entry points—it’s not about the files Isolation is the only solution that can absolutely eliminate kernel-level exploits and malware escapes It’s time to rethink information security defense around fewer, smarter, yet more effective layers You have many more endpoints than you think. How many endpoints do [...]

See Bromium in Action

Put an end to malware and attacks once and for all. Request a demo of the Bromium Secure Platform to learn how Bromium uses virtualization-based security to isolate applications and stop threats. Complete the form to request a demo.

Thank you! The information has been submitted successfully.

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close