Data Talks: Bromium Analyzes Live Running Malware from a Unique Threat Vantage Point

2018-08-01T19:12:37+00:00 August 2nd, 2018|Threats|

Bromium Threat Labs debuts a new multi-part blog series called Data Talks The series features highlights of “live capture” threat research using aggregated data voluntarily reported by Bromium customers Look for deep-dives, trends, and predictions to guide you when you know that detection isn’t enough to keep you safe Today we’re kicking off a new [...]

Protection First Strategy: Application Isolation as the Last Line of Defense

2018-07-24T09:13:17+00:00 July 24th, 2018|Threats|

Endpoint security is a top priority for enterprise organizations and government agencies, but despite gains in detection-based tools, cybercriminals continue to find ways to bypass layered defenses Relying on detection-based solutions alone will not protect your systems and infrastructure from attacks New approaches, such as virtualization, can provide the desperately needed last line of defense [...]

Malware & Fileless Malware: How It’s Created, How It Spreads, and What To Do About It [On-Demand Webinar]

2018-07-20T17:47:52+00:00 July 19th, 2018|Threats|

In this Dark Reading webinar, experts in cybersecurity share their views on what’s going on with malware, and how it evolves to outsmart even your most elaborate defenses Hear about the growing proliferation of “fileless malware” — malware that uses trusted programs in sinister ways, instead of delivering the usual malicious payloads — and find [...]

Protecting your Enterprise from Business Email Compromise

2018-07-20T17:47:59+00:00 May 21st, 2018|Threats|

Business Email Compromise (BEC) is a growing threat that has resulted in companies losing billions of dollars since 2013 BEC starts with spear phishing and traditional attacks to install spyware Bromium prevents attackers from getting their first foot in the door Within Bromium, the acronym BEC stands for the Bromium Enterprise Controller that’s used to [...]

Dissecting the POP SS Vulnerability

2018-05-17T02:00:38+00:00 May 17th, 2018|Threats|

The newly uncovered POP SS vulnerability takes advantage of a widespread misconception about behaviour of pop ss or mov ss  instructions resulting in exceptions when the instruction immediately following is an interrupt. It is a privilege escalation, and as a result it assumes that the attacker has some level of control over a userland process [...]

Phone the Sender – Best or Worst New Security Practice?

2018-07-25T11:05:45+00:00 April 30th, 2018|Threats|

Sophisticated phishing attacks may originate from compromised email accounts of legitimate business partners New "best practice" security recommendation is to phone the sender whenever an unexpected attachment arrives Bromium isolates each email attachment so that users can click with confidence and maximize their productivity Do you receive a lot of email attachments from people you [...]

Bromium vs. Remote Browsers: Downloads Make the Difference

2018-03-26T08:00:22+00:00 March 26th, 2018|Threats|

Remote browsers stop web exploits but do little to solve the much larger problem of malicious file downloads Users expect to download the actual documents they’ve selected, not remote renderings or hollow substitutes Bromium isolates web downloads so users can work safely with them fully-functional in their native file formats I don’t know about you, [...]

Internet Explorer is Dead, Long Live Internet Explorer?

2018-02-26T03:00:26+00:00 February 26th, 2018|Threats|

Most enterprises still need Internet Explorer for access to legacy web applications While Chrome and Edge are significantly more secure than IE, they are still susceptible to malicious downloads Bromium allows you to safely run Internet Explorer, while it also protects modern browsers such as Chrome and Edge Internet Explorer (IE) was the most widely [...]

We have Answers: Questions from the “Validating the Known” Webinar with IDC

2018-02-23T01:45:50+00:00 February 23rd, 2018|Threats|

Featured speaker Frank Dickson, IDC Research Director for Security Products, presented his new research: “Validating the Known: A Different Approach to Cybersecurity” He discussed why detection of malicious code can no longer protect your IT systems against cyberattacks Frank showed how new tactics based on “validating the known” can help boost IT security, and focused on [...]

See Bromium in Action

Put an end to malware and attacks once and for all. Request a demo of the Bromium Secure Platform to learn how Bromium uses virtualization-based security to isolate applications and stop threats. Complete the form to request a demo.

Thank you! The information has been submitted successfully.

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close