Hackers Keep it Simple: Malware Evades Detection by Simply Copying a File

2018-02-13T10:45:09+00:00February 13th, 2018|Threats|

New malware technique evades detection by simply copying a file We break it down step-by-step to show you how it works Innovative hackers continue to deliver sophisticated malware that evades detection The Bromium Lab is back to break down a recent outbreak of sneaky malware, shared with us by some of our customers who caught [...]

How to Use Bromium Application Isolation to Secure Microsoft Edge Downloads

2018-02-05T07:40:16+00:00February 5th, 2018|Innovation|

Microsoft Edge browser does not isolate web file downloads Learn how to use Bromium to isolate your Microsoft Edge web file downloads Bromium works with all Microsoft virtualization-based security (VBS) technologies Microsoft jumps on the application isolation bandwagon. In December 2017, Bromium welcomed the arrival of the Windows Defender Application Guard (WDAG) for Microsoft Edge, [...]

We Have Answers: Questions from 2018 Cybersecurity Core Capabilities Webinar

2018-02-01T10:00:39+00:00February 1st, 2018|Government, Innovation|

Nicolas Chaillan, cybersecurity architect who worked for Homeland Security in the United States provided guidelines for your 2018 cybersercurity strategy. It is based on what he built for Cyber.gov - a strategy that takes the best of the best and delivers results based on the level of security you need. His recommendations work for both [...]

Seasons Greetings? Not When That’s Malware In Your e-Card

2018-01-29T05:45:39+00:00January 29th, 2018|Threats|

Over Christmas, one of our customers was hit by a Trojan and they asked us to take a look at the threat. Sixteen of their users were fooled into opening a Word document. Fortunately, they had Bromium, so it safely ran inside a micro-VM and was unable to affect their host or their intranet. Seasons [...]

Anatomy of Meltdown – A Technical Journey

2018-01-15T17:56:09+00:00January 15th, 2018|Breaking News, Threats|

This blog reviews the details of Meltdown and discusses the inherent immunity for end users provided by Bromium's architecture. Meltdown is an Intel CPU vulnerability leveraging speculative execution which gives an attacker-controlled process the ability to read arbitrary memory belonging to the kernel. Although it doesn't allow for an attacker to directly take control of the kernel, there [...]

Bromium Honored for Excellence in Government Cybersecurity

2018-01-09T14:21:37+00:00January 9th, 2018|Company News, Government|

We have a successful track record protecting federal government customers from known and unknown attacks Leading government security awards program recognizes Bromium’s continued commitment to the public sector Bromium provides defense-grade protection, allowing government employees to work as usual On January 8th, we received exciting news that we won two Government Security News Homeland Security [...]

Easily Isolate Downloads and Executables So Threats Can’t Escape [video]

2018-01-03T13:38:40+00:00January 3rd, 2018|Threats|

Safely download any file from the web or a shared link, even if it is malicious Eliminate restrictive IT security policies that limit user access to downloaded files and inhibit workflows Automatically verify the integrity of downloaded files without involving the Helpdesk Most knowledge-workers are on the internet all day long, mixing business and personal [...]

Malicious Phishing Protection Achieved with Bromium’s Application Isolation [video]

2018-01-03T05:49:48+00:00January 3rd, 2018|Threats|

Use Bromium to stop malicious phishing and safely open any shared web link from email or chat clients Eliminate restrictive IT security policies that limit user access to shared URLs Protect remote and roaming endpoints from malicious links when outside of layered defenses The news isn’t good. Malicious phishing links in email and chat clients [...]

Breachless Threat Intelligence: A Pain-Free Approach to CyberSecurity

2017-07-17T03:07:58+00:00July 17th, 2017|Innovation|

Enterprises need a steady stream of actionable, timely, and accurate threat intelligence on targeted malicious intrusions and attempts into their networks They need this information without suffering breaches and cannot rely solely on post-compromise forensics or sandbox simulations to continuously tighten and adapt their defenses Pre-breach targeted intelligence eludes most organizations today, even among security [...]

As Vendors Talk WannaCry, We Want You to Know What You Can Expect from Bromium

2017-05-19T18:05:24+00:00May 19th, 2017|Company News|

As WannaCry went nuts last week and everyone moved quickly to support one another; we all moved on our best intelligence at the time. Because most ransomware is typically delivered via email, website or file, we worked with our customers to make sure their endpoints were protected. One week later, I wanted to take a [...]

See Bromium in Action

Put an end to malware and attacks once and for all. Request a demo of the Bromium Secure Platform to learn how Bromium uses virtualization-based security to isolate applications and stop threats. Complete the form to request a demo.

Thank you! The information has been submitted successfully.

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close